Cisco XR 12000 Series Getting Started Manual

Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Cisco IOS XR Software Release 4.1
Americas Headquarters
Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000
800 553-NETS (6387)
Text Part Number: OL-24755-01
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Cisco and the Cisco Logo are trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and other countries. A listing of Cisco's trademarks can be found at
www.cisco.com/go/trademarks. Third party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership
relationship between Cisco and any other company. (1005R)
Any Internet Protocol (IP) addresses used in this document are not intended to be actual addresses. Any examples, command display output, and figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses in illustrative content is unintentional and coincidental.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Copyright © 2010-2011Cisco Systems, Inc. All rights reserved.

CONTENTS

Preface ix
Changes to This Document ix
About This Document ix
Obtaining Documentation and Submitting a Service Request xi
Introduction to Cisco IOS XR Software 1-1
Contents 1-1
Supported Standalone System Configurations 1-1
Cisco XR 12000 Series Router Overview 1-2
Features and Capabilities 1-2
Router Management Interfaces 1-7
Command-Line Interface 1-7 Extensible Markup Language API 1-8 Simple Network Management Protocol 1-8
Selecting and Identifying the Designated Shelf Controller 1-9
Selecting and Identifying the DSC on Cisco XR 12000 and 12000 Series Routers 1-9 Verifying the DSC 1-9
Connecting to the Router Through the Console Port 1-10
Where to Go Next 1-16
Bringing Up the Cisco IOS XR Software on a Standalone Router 2-17
Contents 2-17
Prerequisites 2-17
Software Requirements 2-18 Hardware Prerequisites and Documentation 2-18
Bringing Up and Configuring a Standalone Router 2-19
Verifying the System After Initial Boot 2-20
Where to Go Next 2-25
Configuring General Router Features 3-27
Contents 3-27
Secure Domain Routers 3-27
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
iii
Contents
Connecting and Communicating with the Router 3-28
Establishing a Connection Through the Console Port 3-32 Establishing a Connection Through a Terminal Server 3-34 Establishing a Connection Through the Management Ethernet Interface 3-36
Logging In to a Router or an SDR 3-36
CLI Prompt 3-37
User Access Privileges 3-38
User Groups, Task Groups, and Task IDs 3-39 Predefined User Groups 3-40 Displaying the User Groups and Task IDs for Your User Account 3-41
Navigating the Cisco IOS XR Command Modes 3-43
Identifying the Command Mode in the CLI Prompt 3-44 Summary of Common Command Modes 3-45 Entering EXEC Commands from a Configuration Mode 3-47 Command Mode Navigation Example 3-48
Managing Configuration Sessions 3-49
Displaying the Active Configuration Sessions 3-51 Starting a Configuration Session 3-52 Starting an Exclusive Configuration Session 3-53 Displaying Configuration Details with show Commands 3-54 Saving the Target Configuration to a File 3-60 Loading the Target Configuration from a File 3-61 Loading an Alternative Configuration at System Startup 3-61 Clearing All Changes to a Target Configuration 3-61 Committing Changes to the Running Configuration 3-62 Reloading a Failed Configuration 3-64 Exiting a Configuration Submode 3-64 Returning Directly to Configuration Mode from a Submode 3-65 Ending a Configuration Session 3-65 Aborting a Configuration Session 3-65
Configuring the SDR Hostname 3-66
Configuring the Management Ethernet Interface 3-66
Specifying the Management Ethernet Interface Name in CLI Commands 3-67
iv
Displaying the Available Management Ethernet Interfaces 3-67
Configuring the Management Ethernet Interface 3-68
Manually Setting the Router Clock 3-72
Where to Go Next 3-74
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Configuring Additional Router Features 4-75
Contents 4-75
Configuring the Domain Name and Domain Name Server 4-75
Configuring Telnet, HTTP, and XML Host Services 4-77
Prerequisites 4-77
Managing Configuration History and Rollback 4-81
Displaying the Commit IDs 4-82 Displaying the Configuration Changes Recorded in a Commit ID 4-82 Previewing Rollback Configuration Changes 4-83 Rolling Back the Configuration to a Specific Rollback Point 4-83 Rolling Back the Configuration over a Specified Number of Commits 4-84 Loading Commit ID Configuration Changes to the Target Configuration 4-84 Loading Rollback Configuration Changes to the Target Configuration 4-85 Deleting Commit IDs 4-86
Contents
Configuring Logging and Logging Correlation 4-86
Logging Locations and Severity Levels 4-87 Alarm Logging Correlation 4-87 Configuring Basic Message Logging 4-88 Disabling Console Logging 4-90
Creating and Modifying User Accounts and User Groups 4-90
Displaying Details About User Accounts, User Groups, and Task IDs 4-91
CLI Tips, Techniques, and Shortcuts 5-93
Contents 5-93
CLI Tips and Shortcuts 5-93
Entering Abbreviated Commands 5-93 Using the Question Mark (?) to Display On-Screen Command Help 5-94 Completing a Partial Command with the Tab Key 5-96 Identifying Command Syntax Errors 5-96 Using the no Form of a Command 5-97 Editing Command Lines that Wrap 5-97
Displaying System Information with show Commands 5-98
Common show Commands 5-98 Browsing Display Output When the --More-- Prompt Appears 5-99 Halting the Display of Screen Output 5-100 Redirecting Output to a File 5-100
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
v
Contents
Narrowing Output from Large Configurations 5-100 Filtering show Command Output 5-102 show parser dump command 5-105 Accessing Admin Commands from Secure Domain Router Mode 5-105 Location Keyword for the File Command 5-105 vty / Console Timestamp 5-106 Displaying Interfaces by Slot Order 5-106 Displaying Unconfigured Interfaces 5-107 Displaying Subnet Mask in CIDR Format 5-108
Wildcards, Templates, and Aliases 5-109
Using Wildcards to Identify Interfaces in show Commands 5-109 Creating Configuration Templates 5-110 Applying Configuration Templates 5-112 Aliases 5-113 Keystrokes Used as Command Aliases 5-114
Command History 5-114
Displaying Previously Entered Commands 5-114 Recalling Previously Entered Commands 5-114 Recalling Deleted Entries 5-115 Redisplaying the Command Line 5-115 Displaying Persistent CLI History 5-115
Key Combinations 5-116
Key Combinations to Move the Cursor 5-116 Keystrokes to Control Capitalization 5-117 Keystrokes to Delete CLI Entries 5-118 Transposing Mistyped Characters 5-118
Troubleshooting the Cisco IOS XR Software 6-119
Contents 6-119
Additional Sources of Information 6-119
Basic Troubleshooting Commands 6-119
Using show Commands to Display System Status and Configuration 6-120 Using the ping Command 6-121 Using the traceroute Command 6-122 Using debug Commands 6-123
vi
Configuration Error Messages 6-127
Configuration Failures During a Commit Operation 6-127
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Configuration Errors at Startup 6-127
Memory Warnings in Configuration Sessions 6-128
Understanding Low-Memory Warnings in Configuration Sessions 6-128 Displaying System Memory Information 6-129 Removing Configurations to Resolve Low-Memory Warnings 6-130 Contacting TAC for Additional Assistance 6-132
Interfaces Not Coming Up 6-132
Verifying the System Interfaces 6-132
Understanding Regular Expressions, Special Characters, and Patterns A-137
Contents A-137
Regular Expressions A-137
Special Characters A-138
Character Pattern Ranges A-138
Multiple-Character Patterns A-139
Contents
G
LOSSARY
I
NDEX
Complex Regular Expressions Using Multipliers A-139
Pattern Alternation A-140
Anchor Characters A-140
Underscore Wildcard A-140
Parentheses Used for Pattern Recall A-141
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
vii
Contents
viii
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01

Preface

This guide describes how to create the initial configuration for a router using the Cisco IOS XR software. This guide also describes how to complete additional administration, maintenance, and troubleshooting tasks that may be required after initial configuration.
This preface contains the following sections:
Changes to This Document, page ix
About This Document, page ix
Obtaining Documentation and Submitting a Service Request, page xi

Changes to This Document

Tabl e 1 lists the technical changes made to this document since it was first printed.
Table 1 Changes to This Document
Revision Date Change Summary
OL-24755-01 April 2011 Initial release of this document.

About This Document

The following sections provide information about Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router and related documents:
Intended Audience, page x
Organization of the Document, page x
Related Documents, page x
Conventions, page xi
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
ix
Intended Audience
This document is intended for the following people:
Experienced service provider administrators
Cisco telecommunications management engineers
Third-party field service technicians who have completed the Cisco IOS XR software training
sessions
Customers who daily use and manage routers running Cisco IOS XR software
Organization of the Document
This document contains the following chapters:
Introduction to Cisco IOS XR Software
Bringing Up the Cisco IOS XR Software on a Standalone Router
Configuring General Router Features
Configuring Additional Router Features
CLI Tips, Techniques, and Shortcuts
Preface
Troubleshooting the Cisco IOS XR Software
Understanding Regular Expressions, Special Characters, and Patterns
Related Documents
For a complete listing of available documentation for the Cisco IOS XR software and the routers on which it operates, see the following URLs:
Cisco IOS XR Software Documentation
http://www.cisco.com/en/US/products/ps5845/tsd_products_support_series_home.html
Cisco XR 12000 Series Router Documentation
http://www.cisco.com/en/US/products/ps6342/tsd_products_support_series_home.html
Cisco IOS XR ROM Monitor Guide Cisco IOS XR System Management Configuration Guide Cisco IOS XR System Security Configuration Guide Cisco IOS XR Routing Configuration Guide Cisco IOS XR Interface and Hardware Component Configuration Guide
http://www.cisco.com/en/US/products/ps5845/ products_installation_and_configuration_guides_list.html
Cisco IOS XR Interface and Hardware Component Command Reference Cisco IOS XR Routing Command Reference
http://www.cisco.com/en/US/products/ps5845/prod_command_reference_list.html
Note Cisco IOS XR software runs only on the Cisco XR 12000 Series Routers listed in the “Supported
Standalone System Configurations” section on page 1-1.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
x
OL-24755-01
Preface
Conventions
This document uses the following conventions:
Convention Item
boldface font Commands and keywords
italic font Variable for which you supply values
screen font Displayed session and system information
boldface screen font Commands and keywords you enter in an
interactive environment
italic screen font Variables you enter in an interactive environment
boldface font Menu items and button names
Option > Network Preferences Menu navigation
Note Means reader take note. Notes contain helpful suggestions or references to material not covered in the
publication.
Tip Means the following information will help you solve a problem. The information in tips might not be
troubleshooting or an action, but contains useful information.
Caution Means reader be careful. In this situation, you might do something that could result in equipment
damage or loss of data.

Obtaining Documentation and Submitting a Service Request

For information on obtaining documentation, submitting a service request, and gathering additional information, see the monthly What’s New in Cisco Product Documentation, which also lists all new and revised Cisco technical documentation, at:
http://www.cisco.com/en/US/docs/general/whatsnew/whatsnew.html
Subscribe to the What’s New in Cisco Product Documentation as a Really Simple Syndication (RSS) feed and set content to be delivered directly to your desktop using a reader application. The RSS feeds are a free service and Cisco currently supports RSS version 2.0.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
xi
Preface
xii
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01

Contents

CHAPTER
1

Introduction to Cisco IOS XR Software

This chapter introduces the routers that support Cisco IOS XR software. It also introduces router concepts, features, and user interfaces.
Supported Standalone System Configurations, page 1-1
Cisco XR 12000 Series Router Overview, page 1-2
Router Management Interfaces, page 1-7
Selecting and Identifying the Designated Shelf Controller, page 1-9
Connecting to the Router Through the Console Port, page 1-10
Where to Go Next, page 1-16

Supported Standalone System Configurations

The Cisco IOS XR software runs on the following standalone systems:
Cisco XR 12006 Router
Cisco XR 12008 Router
Cisco XR 12010 Router
Cisco XR 12012 Router
Cisco XR 12016 Router
Cisco XR 12404 Router
Cisco XR 12406 Router
Cisco XR 12410 Router
Cisco XR 12416 Router
Note Many cards operate in both Cisco XR 12000 Series Routers and in Cisco 12000 Series Internal Routers.
For the latest information on which cards are supported by the Cisco IOS XR software in Cisco XR 12000 Series Routers and Cisco 12000 Series Internal Routers, see Release Notes for
Command Cisco IOS XR Software Release 4.0.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
1-1

Cisco XR 12000 Series Router Overview

Cisco XR 12000 Series Router Overview
The Cisco XR 12000 Series Router is powered by Cisco IOS XR software, allowing service providers to isolate public and private services through the virtualization of a single router into separate physical and logical partitions. Cisco IOS XR software is a unique self-healing and self-defending operating system designed for always-on operation while scaling capacity and adding new services or features. With distributed processing intelligence and robust quality-of-service (QoS) and multicast mechanisms, the Cisco XR 12000 Series Router allows providers to scale services and customers with performance.

Features and Capabilities

The router is a scalable carrier-class distributed forwarding router, which is designed for redundancy, high security and availability, packaging, power, and other requirements needed by service providers.
The router aggregates triple play Multi-service edge and Ethernet service traffic aggregating these services to 10 Gigabit Ethernet IP, MPLS edge, or core. It support Ethernet, serial (including MLPPP), frame relay and POS interface on the access side and Ethernet or POS interfaces on the core side.
The following sections describe the features and capabilities in detail:
Chapter 1 Introduction to Cisco IOS XR Software
Cisco IOS XR Software, page 1-2
Flexible Ethernet, page 1-4
L2VPN, page 1-4
Multicast, page 1-5
OAM, page 1-5
Layer 3 Routing, page 1-5
MPLS VPN, page 1-6
QoS, page 1-6
MPLS TE, page 1-7
Cisco IOS XR Software
The router runs Cisco IOS XR Software, which offers the following:
Rich Networking Feature Set—Cisco IOS XR Software represents a continuation of the Cisco
networking leadership in helping customers realize the power of their networks and the Internet. It provides unprecedented routing-system scalability, high availability, service isolation, and manageability to meet the mission-critical requirements of next-generation networks.
Operating system infrastructure protection—Cisco IOS XR Software provides a microkernel
architecture that forces all but the most critical functions, such as memory management and thread distribution, outside of the kernel, thereby preventing failures in applications, file systems, and even device drivers from causing widespread service disruption.
Process and thread protection—Each process, even individual process thread, is executed in its own
protected memory space, and communications between processes are accomplished through well-defined, secure, and version-controlled application programming interfaces (APIs), significantly minimizing the effect that any process failure can have on other processes.
1-2
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Cisco In-Service Software Upgrade (ISSU)—Cisco IOS XR Software modularity sustains system
availability during installation of a software upgrade. ISSUs or hitless software upgrades (HSUs) allow you to upgrade most Cisco router software features without affecting deployed services. You can target particular system components for upgrades based on software packages or composites that group selected features. Cisco preconfigures and tests these packages and composites to help ensure system compatibility.
Process restart—You can restart critical control-plane processes both manually and automatically in
response to a process failure versus restarting the entire operating system. This feature supports the Cisco IOS XR Software goal of continuous system availability and allows for quick recovery from process or protocol failures with minimal disruption to customers or traffic.
State checkpoint—You can maintain a memory and critical operating state across process restarts to
sustain routing adjacencies and signaling state during a Route Switch Processor (RSP) switchover.
Ethernet virtual connections (EVCs)—Ethernet services are supported using individual EVCs to
carry traffic belonging to a specific service type or end user through the network. You can use EVC-based services in conjunction with MPLS-based L2VPNs and native IEEE bridging deployments.
Flexible VLAN classification—VLAN classification into Ethernet flow points (EFPs) includes
single-tagged VLANs, double-tagged VLANs (QinQ and IEEE 802.1ad), contiguous VLAN ranges, and noncontiguous VLAN lists.
Cisco XR 12000 Series Router Overview
IEEE Bridging—Software supports native bridging based on IEEE 802.1Q, IEEE 802.1ad, IEEE
802.1ah provider backbone bridges (PBB) and QinQ VLAN encapsulation mechanisms on the router.
IEEE 802.1s Multiple Spanning Tree (MST)—MST extends the IEEE 802.1w Rapid Spanning Tree
Protocol (MSTP) to multiple spanning trees, providing rapid convergence and load balancing.
MST Access Gateway—This feature provides a resilient, fast-convergence mechanism for
aggregating and connecting to Ethernet-based access rings.
Virtual Private LAN Services (VPLS)—VPLS is a class of VPN that supports the connection of
multiple sites in a single, bridged domain over a managed IP/MPLS network. It presents an Ethernet interface to customers, simplifying the LAN and WAN boundary for service providers and customers, and enabling rapid and flexible service provisioning because the service bandwidth is not tied to the physical interface. All services in a VPLS appear to be on the same LAN, regardless of location.
Hierarchical VPLS (H-VPLS)—H-VPLS provides a level of hierarchy at the edge of the VPLS
network for increased scale. QinQ access and H-VPLS pseudowire access options are supported.
Virtual Private WAN Services/Ethernet over MPLS (VPWS/EoMPLS)—EoMPLS transports
Ethernet frames across an MPLS core using pseudowires. Individual EFPs or an entire port can be transported over the MPLS backbone using pseudowires to an egress interface or subinterface.
Pseudowire redundancy—Pseudowire redundancy supports the definition of a backup pseudowire to
protect a primary pseudowire that fails.
Multisegment pseudowire stitching—Multisegment pseudowire stitching is a method for
interworking two pseudowires together to form a cross-connect relationship.
OL-24755-01
IPv4 Multicast—IPv4 Multicast supports Internet Group Management Protocol Versions 2 and 3
(IGMPv2/v3), Protocol Independent Multicast Source Specific Multicast (SSM) and Sparse Mode (SM), Multicast Source Discovery Protocol (MSDP), and Anycast Rendezvous Point (RP).
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-3
Cisco XR 12000 Series Router Overview
IGMP v2/v3 Snooping—This Layer 2 mechanism efficiently tracks multicast membership on an
N-Tuple Hashing—A new 7-tuple hash algorithm, which provides better load balancing across equal
Link Bundling Phase 3—The link bundle interface is enabled to be used as an edge-facing interface
Flexible Ethernet
The router uses Ethernet as its transport mechanism, which offers the following:
Ethernet virtual connections (EVCs)—Ethernet services are supported using individual EVCs to
Chapter 1 Introduction to Cisco IOS XR Software
L2VPN network. Individual IGMP joins are snooped at the VLAN level or pseudowire level, and then it summarizes the results into a single upstream join message. In residential broadband deployments, this feature enables the network to send only channels that are being watched to the downstream users.
cost paths, is introduced. This algorithm uses additional Layer 4 information from the Layer 3 packet. For more information on 7-tuple hashing, see the Cisco IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router.
by providing a number of new features, such as ACL, Mac Accounting, IPv6, PIMv6, uRPF, MVPN, L2VPN, BFD, and Unequal BW. For more information on link bundling phase 3, see the Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco XR 12000 Series Router.
carry traffic belonging to a specific service type or end user through the network. You can use EVC-based services in conjunction with MPLS-based L2VPNs and native IEEE bridging deployments.
L2VPN
Flexible VLAN classification—VLAN classification into EFPs includes single-tagged VLANs,
double-tagged VLANs (QinQ and IEEE 802.1ad), contiguous VLAN ranges, and noncontiguous VLAN lists.
IEEE Bridging— The software supports native bridging based on IEEE 802.1Q, IEEE 802.1ad, and
QinQ VLAN encapsulation mechanisms on the router.
IEEE 802.1s Multiple Spanning Tree (MST)—MST extends the MSTP to multiple spanning trees,
providing rapid convergence and load balancing.
MST Access Gateway—This feature provides a resilient, fast-convergence mechanism for
aggregating and connecting to Ethernet-based access rings.
The router uses L2VPNs, which offers the following:
Virtual Private LAN Services (VPLS)—VPLS is a class of VPN that supports the connection of
multiple sites in a single, bridged domain over a managed IP/MPLS network. It presents an Ethernet interface to customers, simplifying the LAN and WAN boundary for service providers and customers, and enabling rapid and flexible service provisioning because the service bandwidth is not tied to the physical interface. All services in a VPLS appear to be on the same LAN, regardless of location.
Hierarchical VPLS (H-VPLS)—H-VPLS provides a level of hierarchy at the edge of the VPLS
network for increased scale. QinQ access and H-VPLS pseudowire access options are supported.
Virtual Private WAN Services/Ethernet over MPLS (VPWS/EoMPLS)—EoMPLS transports
Ethernet frames across an MPLS core using pseudowires. Individual EFPs or an entire port can be transported over the MPLS backbone using pseudowires to an egress interface or subinterface.
1-4
Pseudowire redundancy—Pseudowire redundancy supports the definition of a backup pseudowire to
protect a primary pseudowire that fails.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Multisegment pseudowire stitching—This feature is a method used to interwork two pseudowires
together to form a cross-connect relationship.
Multicast
The router supports multicast, which offers the following:
IPv4 Multicast—IPv4 Multicast supports Internet Group Management Protocol Versions 2 and 3
(IGMPv2/v3), Protocol Independent Multicast Source Specific Multicast (SSM) and Sparse Mode (SM), Multicast Source Discovery Protocol (MSDP), and Anycast Rendezvous Point (RP).
IGMP v2/v3 Snooping—This Layer 2 mechanism efficiently tracks multicast membership on an
L2VPN network. Individual IGMP joins are snooped at the VLAN level or pseudowire level, and then it summarizes the results into a single upstream join message. In residential broadband deployments, this feature enables the network to send only channels that are being watched to the downstream users.
OAM
The router supports different types of operations, administration, and maintenance (OAM), which offers the following:
Cisco XR 12000 Series Router Overview
Layer 3 Routing
E-OAM (IEEE 802.3ah)—Ethernet link layer OAM is a vital component of EOAM that provides
physical-link OAM to monitor link health and assist in fault isolation. Along with IEEE 802.1ag, Ethernet link layer OAM can be used to assist in rapid link-failure detection and signaling to remote end nodes of a local failure.
E-OAM (IEEE 802.1ag and ITU-T Y.1731)—Ethernet Connectivity Fault Management (CFM) is a
service-level OAM protocol that provides a number of mechanisms for fault management and performance monitoring. This includes procedures for monitoring and verifying the path between multiple end points, via IEEE 802.1 bridges and LANs.
MPLS OAM—This protocol supports Label Switched Path (LSP) ping, LSP TraceRoute, and Virtual
Circuit Connectivity Verification (VCCV). .
Ethernet SLA (Service Level Agreement)—The router supports a feature-rich manageability
interface for performance monitoring, using the capabilities provided by the Ethernet CFM.
Ethernet Fault Detection—The router supports a mechanism to use faults detected by Ethernet OAM
protocols as a trigger to bring down interfaces or sub-interfaces. Hence, there is a trigger protection switching or L3 re-routing during a failure.
The router runs Cisco IOS XR Software, which supports Layer 3 routing and a range of IPv4 services and routing protocols, including the following:
Intermediate System-to-Intermediate System (IS-IS)—Integrated Intermediate IS-IS, Internet
Protocol Version 4 (IPv4), is a standards-based Interior Gateway Protocol (IGP). For more information on IS-IS, see Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
Open Shortest Path First (OSPF)—OSPF is an IGP developed by the OSPF working group of the
Internet Engineering Task Force (IETF). For more information on OSPF, see Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-5
Cisco XR 12000 Series Router Overview
Static Routing—Static routes are user-defined routes that cause packets moving between a source
and a destination to take a specified path. For more information on static routing, see Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
IPv4 Multicast—IPv4 Multicast delivers source traffic to multiple receivers without adding any
additional burden on the source or the receivers while using the least network bandwidth of any competing technology. For more information on IPv4 Multicast, see Cisco IOS XR Multicast Configuration Guide for the Cisco XR 12000 Series Router.
Routing Policy Language (RPL)—RPL provides a single, straightforward language in which all
routing policy needs can be expressed. For more information on RPL, see Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
Hot Standby Router Protocol (HSRP)—HSRP is an IP routing redundancy protocol designed to
allow for transparent failover at the first-hop IP router. For more information on HSRP, see Cisco IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router.
Virtual Router Redundancy Protocol (VRRP)—VRRP allows for transparent failover at the first-hop
IP router, enabling a group of routers to form a single virtual router. For more information on VRRP, see Cisco IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router.
Border Gateway Protocol (BGP) Add Path— This feature enables a BGP speaker to send multiple
paths for a prefix. For more information on BGP Add Path, see Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
Selective VRF Download (SVD)—This feature allows the download of only those prefixes and
labels to a line card that are actively required to forward traffic through that line card. For more information on SVD, see the Cisco IOS XR Routing Configuration Guide for the Cisco XR 12000 Series Router.
Chapter 1 Introduction to Cisco IOS XR Software
MPLS VPN
QoS
The router supports MPLS VPN, which offers the following:
MPLS L3VPN—This IP VPN feature for MPLS allows a Cisco IOS Software or
Cisco IOS XR software network to deploy scalable IPv4 Layer 3 VPN backbone services. An IP VPN is the foundation that companies use for deploying or administering value-added services, including applications and data hosting network commerce and telephony services, to business customers.
Carrier Supporting Carrier (CSC)—CSC allows an MPLS VPN service provider to connect
geographically isolated sites using another backbone service provider and still maintain a private address space for its customer VPNs. It is implemented as defined by IETF RFC 4364.
Inter-AS—is a peer-to-peer type model that allows extension of VPNs through multiple provider or
multi-domain networks. This lets service providers peer up with one another to offer end-to-end VPN connectivity over extended geographical locations. An MPLS VPN Inter-AS allows:
VPN to cross more than one service provider backbone.
VPN to exist in different areas.
Confederations to optimize Internal Border Gateway Protocol (iBGP) meshing.
The router supports many types of quality of service (QoS), which offers the following:
1-6
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
QoS—Comprehensive QoS support with up to 3 million queues, Class-Based Weighted Fair
Queuing (CBWFQ) based on a three-parameter scheduler, Weighted Random Early Detection (WRED), two-level strict priority scheduling with priority propagation, and 2-rate, 3-color (2R3C) Policing are all supported.
Cisco IOS XR Software—This software supports a rich variety of QoS mechanisms, including
policing, marking, queuing, dropping, and shaping. In addition, the operating systems support Modular QoS CLI (MQC). Modular CLI is used to configure various QoS features on various Cisco platforms.
H-QoS—Is supported on Ethernet interfaces. For EVCs four-level H-QoS support is provided with
the following hierarchy levels: port, group of EFPs, EFP, and class of service. This level of support allows for per-service and per-end user QoS granularity. Four-level H-QoS support is provided for EVCs with the following hierarchy levels: port, group of EFPs, EFP, and class of service. This level of support allows for per-service and per-end user QoS granularity. H-QOS support is also provided on SIP based interfaces.
MPLS TE
The router supports MPLE Traffic Engineering (TE), which offers the following:
MPLS TE—Cisco IOS XR Software supports MPLS protocols such as Traffic Engineering/Fast
Reroute (TE-FRR), Resource Reservation Protocol (RSVP), Label Distribution Protocol (LDP), and Targeted Label Distribution Protocol (T-LDP).

Router Management Interfaces

MPLS TE Preferred Path—Preferred tunnel path functions let you map pseudowires to specific TE
tunnels. Attachment circuits are cross-connected to specific MPLS TE tunnel interfaces instead of remote provider-edge router IP addresses (reachable using IGP or LDP).
Ignore Intermediate System-to-Intermediate System (IS-IS) Overload Bit Avoidance—This feature
allows network administrators to prevent a RSVP-TE Label Switched Path (LSP) from being disabled when a router in that path has its Intermediate System-to-Intermediate System (IS-IS) overload bit set. For more information on IS-IS overload bit aviodance, see the Cisco IOS XR MPLS Configuration Guide for the Cisco XR 12000 Series Router.
Router Management Interfaces
Because new routers are not yet configured for your environment, you must begin the configuration using the command-line interface (CLI). This guide provides instructions on using the CLI to configure basic router features. Cisco IOS XR software supports the following router management interfaces, which are described in the following sections:
Command-Line Interface, page 1-7
Extensible Markup Language API, page 1-8
Simple Network Management Protocol, page 1-8

Command-Line Interface

OL-24755-01
The CLI is the primary user interface for configuring, monitoring, and maintaining routers that run Cisco IOS XR software. The CLI allows you to directly and simply execute Cisco IOS XR commands.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-7
Router Management Interfaces
All procedures in this guide use CLI. Before you can use other router management interfaces, you must first use the CLI to install and configure those interfaces. Guidelines for using the CLI to configure the router are discussed in the following chapters:
Configuring General Router Features
Configuring Additional Router Features
CLI Tips, Techniques, and Shortcuts
For more information on CLI procedures for other tasks, such as hardware interface and software protocol management tasks, see the Cisco IOS XR software documents listed in the “Related
Documents” section on page x.

Extensible Markup Language API

The Extensible Markup Language (XML) application programming interface (API) is an XML interface used for rapid development of client applications and perl scripts to manage and monitor the router. Client applications can be used to configure the router or request status information from the router by encoding a request in XML API tags and sending it to the router. The router processes the request and sends the response to the client in the form of encoded XML API tags. The XML API supports readily available transport layers, including Telnet, SSH, and Common Object Request Broker Architecture (CORBA). The Secure Socket Layer (SSL) transport is also supported by the XML API.
Chapter 1 Introduction to Cisco IOS XR Software
For more information, see the Cisco IOS XR software documents listed in the “Related Documents”
section on page x.

Simple Network Management Protocol

Simple Network Management Protocol (SNMP) is an application-layer protocol that facilitates the exchange of management information between network devices. By using SNMP-transported data (such as packets per second and network error rates), network administrators can manage network performance, find and solve network problems, and plan for network growth.
The Cisco IOS XR software supports SNMP v1, v2c, and v3. SNMP is part of a larger architecture called the Internet Network Management Framework (NMF), which is defined in Internet documents called RFCs. The SNMPv1 NMF is defined by RFCs 1155, 1157, and 1212, and the SNMPv2 NMF is defined by RFCs 1441 through 1452..
SNMP is a popular protocol for managing diverse commercial internetworks and those used in universities and research organizations. SNMP-related standardization activity continues even as vendors develop and release state-of-the-art, SNMP-based management applications. SNMP is a relatively simple protocol, yet its feature set is sufficiently powerful to handle the difficult problems presented in trying to manage the heterogeneous networks of today.
For more information, see the Cisco IOS XR software documents listed in the “Related Documents”
section on page x.
1-8
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software

Selecting and Identifying the Designated Shelf Controller

Selecting and Identifying the Designated Shelf Controller
The designated shelf controller (DSC) controls a standalone router or a multishelf system. A DSC is a role that is assigned to one performance route processor (PRP) card in each router . A DSC is a role that is assigned to one performance route processor (PRP) card in each router or multishelf system. PRP cards operate in Cisco XR 12000 and 12000 Series Routers.
Note Throughout this guide, the term PRP is used to refer to the PRP cards supported on
Cisco XR 12000 Series Routers. Cisco XR 12000 Series Routers, support both the PRP-2 and the PRP-3 cards. If a feature or an issue applies to only one platform, the accompanying text specifies the platform.
Although each router can have two RP cards, only one can serve as the DSC and control the router. The DSC provides system-wide administrative functions, including:
User configuration using a terminal connection or network connection
Distribution of software to each node in the router or system
Coordination of software versioning and configurations for all nodes in the router or system
Hardware inventory and environmental monitoring
The first step in setting up a new router is to select or identify the DSC because the initial router configuration takes place through the DSC. The following sections describe how to select and identify the DSC on different routers:
Selecting and Identifying the DSC on Cisco XR 12000 and 12000 Series Routers, page 1-9
Verifying the DSC, page 1-9

Selecting and Identifying the DSC on Cisco XR 12000 and 12000 Series Routers

A Cisco XR 12000 Series Router or Cisco 12000 Series Internal Router supports multiple PRPs. When the router is started for the first time, the PRP in the slot with the lowest number becomes the active PRP and is identified by the alphanumeric display: ACTV RP. The active PRP serves as the DSC. If another PRP is configured as a standby PRP for the DSC, that PRP can assume the DSC role if the DSC fails.
To have a PRP in a higher-numbered slot become the DSC, you must bring up the router with only that PRP installed. After the chosen PRP becomes the DSC, it remains the DSC after subsequent restarts and you can add the other PRPs.
Note Additional PRPs can be installed to host secure domain routers (SDRs), which are introduced in
Chapter 3, “Configuring General Router Features.” To configure general router features, you must
connect to the DSC. To configure SDR features, you must connect to the PRP for the appropriate SDR.

Verifying the DSC

Use the show dsc command to verify which RP is acting as the primary DSC for the router or routing system.
The following example shows sample output of the show dsc command on a Cisco XR 12000 Series Router:
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-9
Chapter 1 Introduction to Cisco IOS XR Software

Connecting to the Router Through the Console Port

RP/0/0/CPU0:router#admin Mon May 31 01:38:09.733 DST RP/0/0/CPU0:router(admin)#show dsc all Mon May 31 01:38:31.134 DST
NODE ROLE PRIORITY TBEACON PRESENT SERIAL ID ============================================================================ 0/0/CPU0 DSC 3 2000 YES invalid
----------------------------------------------------------------------------
Connecting to the Router Through the Console Port
The first time you connect to a new router with Cisco IOS XR software, you must connect through the Console port on the DSC. Although typical router configuration and management take place using an Ethernet port on the DSC, you must configure the console port for your LAN before it can be used.
1-10
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Figure 1-1 shows the PRP-2 connections on the Cisco XR 12000 Series Router. Figure 1-2 shows the PRP-3 connections on the Cisco XR 12000 Series Router.
Note Cisco IOS XR software does not support PRP-1.
Connecting to the Router Through the Console Port
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-11
Chapter 1 Introduction to Cisco IOS XR Software
ACT
SIG
ACT
SIG
SLOT-1
SLOT-0
CONSOLE ETH 2AUX
RESET
PERFORMANCE ROUTE PROCESSOR 2
BITS 1BITS 0
DATA
LINK
DATA
LINK
ETH 1ETH 0
149695
Terminal connection
Modem connection
User-removable flash disk1 stores installation PIE files
A second internal flash disk0 stores installed software and active configurations
LED status displays (alphanumeric)
Remote CLI, CWI, XML,
or SNMP communication.
Remote file storage
Ethernet cable
Network
Local terminal or
terminal server for
CLI communication
RJ-45 cable
Remote terminal for
CLI communication
RJ-45 cable
Management Ethernet connection for out-of-band network communication
Connecting to the Router Through the Console Port
Figure 1-1 Communication Ports on the PRP-2 for a Cisco XR 12000 Series Router
1-12
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
272359
CONSOLE
AUXBITS 1BITS 0ETH 1ETH 0
PERFORMANCE RP 3
RESET
AC
T
S
I
G
AC
T
S
I
G
D
A
T
A
L
IN
K
D
A
TA
L
INK
1 3 4 52
Figure 1-2 Communication Ports on the PRP-3
1 Ejector Lever
2 Handle
3 External Compact Flash
4 Reset button
5 Alphanumeric LEDs
Connecting to the Router Through the Console Port
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-13
Connecting to the Router Through the Console Port
To connect to the router through the Console port, perform the following procedure.
SUMMARY STEPS
1. Power on the standalone router, or power on Rack 0 in a multishelf system.
2. Identify the DSC.
3. Connect a terminal to the Console port of the DSC.
4. Start the terminal emulation program.
5. Press Enter.
6. Log in to the router.
7. admin
8. show dsc all
DETAILED STEPS
Command or Action Purpose
Step 1
Power on the standalone router, or power on Rack 0 in a multishelf system.
Step 2
Step 3
Identify the DSC. Identifies the RP to which you must connect in the next step.
Connect a terminal to the Console port of the DSC. Establishes a communications path to the router.
Chapter 1 Introduction to Cisco IOS XR Software
Starts the router or Rack 0.
This step is required only if the power is not on.
For information on power installation and controls, see
the hardware documentation listed in the “Related
Documents” section on page x.
For more information, see the “Selecting and
Identifying the Designated Shelf Controller” section on page 1-9.
1-14
During the initial setup, you can communicate with the
Router Console port is designed for a serial cable
Terminal settings are:
For information on the cable requirements for the
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
router only through the Console port of the DSC.
connection to a terminal or a computer that is running a terminal emulation program.
Bits per second: 9600/9600
Data bits: 8
Parity: None
Stop bit: 2
Flow control: None
Console port, see the hardware documentation listed in the “Related Documents” section on page x.
OL-24755-01
Chapter 1 Introduction to Cisco IOS XR Software
Command or Action Purpose
Step 4
Step 5
Start the terminal emulation program. (Optional) Prepares a computer for router communications.
Press Enter. Initiates communication with the router.
Connecting to the Router Through the Console Port
Not required if you are connecting through a terminal.
Terminals send keystrokes to, and receive characters,
from another device. If you connect a computer to the Console port, you must use a terminal emulation program to communicate with the router. For instructions on using the terminal emulation program, see the documentation for that program.
If no text or router prompt appears when you connect to
the console port, press Enter to initiate communications.
If no text appears when you press Enter, give the router
more time to complete the initial boot procedure, then press Enter.
If the prompt gets lost among display messages, press
Enter again.
Step 6
Step 7
Step 8
If the router has no configuration, the router displays
the prompt:
If the router has been configured, the router displays the
prompt:
Enter root-system username:
Username:
Log in to the router. Establishes your access rights for the router management
session.
Enter the root-system username and password or the
username and password provided by your system administrator.
After you log in, the router displays the CLI prompt,
which is described in the “CLI Prompt” section on
page 3-37.
If the router prompts you to enter a root-system
username, the router is not configured, and you should follow one of the bring up procedures mentioned in the next section.
admin
Places the router in administration EXEC mode.
Example:
RP/0/0/CPU0:router# admin
show dsc all
Displays the DSC information for the router or router system so that you can verify that you have connected to the
Example:
RP/0/0/CPU0:router(admin)# show dsc all
DSC console port.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
1-15

Where to Go Next

Where to Go Next
If you have logged into the router or multishelf system, you can perform the general router configuration as described in Configuring General Router Features.
If the router is prompting you to enter a root-system username, bring up the router. For more information, see Bringing Up the Cisco IOS XR Software on a Standalone Router.
Chapter 1 Introduction to Cisco IOS XR Software
1-16
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Note If you are upgrading a Cisco XR 12000 Series Router from Cisco IOS software to

Contents

CHAPTER
2

Bringing Up the Cisco IOS XR Software on a Standalone Router

This chapter provides instructions for bringing up the Cisco IOS XR software on a standalone router for the first time. This section applies to standalone routers that are delivered with Cisco IOS XR software installed.
Cisco IOS XR software, see the Cisco IOS XR software document Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router.
Prerequisites, page 2-17
Bringing Up and Configuring a Standalone Router, page 2-19
Verifying the System After Initial Boot, page 2-20
Where to Go Next, page 2-25

Prerequisites

The following sections describe the software and hardware requirements for bringing up a standalone system running Cisco IOS XR Software Release 4.1.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-17
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Prerequisites

Software Requirements

The system requires compatible ROM Monitor firmware on all RPs.
Caution The ROM Monitor firmware on all RPs must be compatible with the Cisco IOS XR software release
currently running on the router before a Cisco XR 12000 Series Router system is upgraded to Cisco IOS XR Software Release 4.1. For minimum ROM Monitor requirements for Cisco IOS XR Software Release
3.2.0 and later releases, see the Software/Firmware Compatibility Matrix at the following URL:
http://www.cisco.com/web/Cisco_IOS_XR_Software/index.html
If the router is brought up with an incompatible version of the ROM Monitor software, the standby RP may fail to boot. For instructions to overcome a boot block in the standby RP in a single-chassis system, see Cisco IOS XR ROM Monitor Guide for the Cisco XR 12000 Series Router. If a boot block occurs in a multishelf system, contact your Cisco Technical Support representative for assistance. See the “Related
Documents” section on page x.

Hardware Prerequisites and Documentation

The Cisco IOS XR software runs on the routers listed in the “Supported Standalone System
Configurations” section on page 1-1. Before a router can be started, the following hardware management
procedures must be completed:
Site preparation
Equipment unpacking
Router installation
For information on how to complete these procedures for your router equipment, see the hardware documents listed in the “Related Documents” section on page x.
Note If you are upgrading a Cisco 12000 Series Router from Cisco IOS software to Cisco IOS XR software,
you must first prepare the router. For more information, see Upgrading from Cisco IOS to Cisco IOS XR Software on the Cisco 12000 Series Router. For a complete listing of available documents, see the
“Related Documents” section on page x.
2-18
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router

Bringing Up and Configuring a Standalone Router

Bringing Up and Configuring a Standalone Router
To bring up a standalone router, connect to the router and configure the root-system username and password, as described in the following procedure:
SUMMARY STEPS
1. Establish a connection to the DSC Console port.
2. Type the username for the root-system login and press Enter.
3. Type the password for the root-system login and press Enter.
4. Log in to the router.
DETAILED STEPS
Command or Action Purpose
Step 1
Establish a connection to the DSC Console port. Initiates communication with the router.
For instructions on connecting to the Console port, see
the “Connecting to the Router Through the Console
Port” section on page 1-10.
After you have successfully connected to the router
through the Console port, the router displays the prompt:
Username:
Step 2
Step 3
Step 4
Step 5
If the Username prompt appears, skip this procedure
and continue the general router configuration as described in Chapter 4, “Configuring Additional
Router Features.”
Type the username for the root-system login and press
Enter.
Type the password for the root-system login and press Enter.
Sets the root-system username, which is used to log in to the router.
Creates an encrypted password for the root-system username.
Note This password can be changed with the secret
command.
Retype the password for the root-system login and press Enter.
Allows the router to verify that you have entered the same password both times.
If the passwords do not match, the router prompts you
to repeat the process.
Log in to the router. Establishes your access rights for the router management
session.
Enter the root-system username and password that were
created earlier in this procedure.
After you log in, the router displays the CLI prompt,
which is described in the CLI Prompt.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-19

Verifying the System After Initial Boot

Examples
The following example shows the root-system username and password configuration for a new router, and it shows the initial log in:
--- Administrative User Dialog --­Enter root-system username: username1 Enter secret: Enter secret again: RP/0/0/CPU0:Jan 10 12:50:53.105 : exec[65652]: %MGBL-CONFIG-6-DB_COMMIT : 'Administration configuration committed by system'. Use 'show configuration commit changes 2000000009' to view the changes. Use the 'admin' mode 'configure' command to modify this configuration. User Access Verification Username: username1 Password: RP/0/0/CPU0:router#
The secret line in the configuration command script shows that the password is encrypted. When you enter the password during configuration and login, the password is hidden.
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Verifying the System After Initial Boot
To verify the status of the router, perform the following procedure:
SUMMARY STEPS
1. show version
2. admin
3. show platform [node-id]
4. exit
5. show redundancy
6. show environment
2-20
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
DETAILED STEPS
Command or Action Purpose
Step 1
show version
Example:
RP/0/0/CPU0:router# show version
Step 2
admin
Example:
RP/0/0/CPU0:router# admin
Step 3
show platform [node-id]
Example:
RP/0/0/CPU0:router(admin)# show platform
Step 4
exit
Verifying the System After Initial Boot
Displays information about the router, including image names, uptime, and other system information.
Places the router in administration EXEC mode.
Displays information about the status of cards and modules installed in the router.
Some cards support a CPU module and service processor
(SP) module. Other cards support only a single module.
A card module is also called a node. When a node is
working properly, the status of the node in the State column is IOS XR RUN. The status of the supported SPA interface is OK.
The show platform node-id command is used to display
information for a specific node. Replace node-id with a node name from the show platform command Node column.
Note To view the status of all the cards and modules, the
show platform command must be executed in administration EXEC mode.
Exits the administration EXEC mode.
Step 5
Step 6
OL-24755-01
Example:
RP/0/0/CPU0:router(admin)# exit
show redundancy
Example:
RP/0/0/CPU0:router# show redundancy
show environment
Example:
RP/0/0/CPU0:router# show environment
Displays the state of the primary (active) and standby (inactive) RPs, including the ability of the standby to take control of the system.
If both RPs are working correctly, one node displays active
role, the Partner node row displays standby role, and the Standby node row displays Ready.
Displays information about the hardware attributes and status.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-21
Verifying the System After Initial Boot
Examples of show Commands
The following sections provide examples of show commands:
show version Command: Example, page 2-22
show platform Command: Example, page 2-23
show redundancy Command: Example, page 2-24
show environment Command: Example, page 2-25
show version Command: Example
The following example shows how to display basic information about the router configuration by entering the show version command in EXEC mode:
RP/0/0/CPU0:router# show version Mon May 31 02:03:29.133 DST
Cisco IOS XR Software, Version 4.1.0[Default] Copyright (c) 2010 by Cisco Systems, Inc.
ROM: System Bootstrap, Version 12.0(20090226:235859) [rtauro-sw30346-33S 1.23dev (0.35)] DEVELOPMENT SOFTWARE Copyright (c) 1994-2009 by cisco Systems, Inc.
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
router uptime is 2 weeks, 6 days, 9 hours, 16 minutes System image file is "disk0:c12k-os-mbi-4.1.0/mbiprp-rp.vm"
cisco 12406/PRP (7457) processor with 2097152K bytes of memory. 7457 processor at 1266Mhz, Revision 1.2
1 Cisco 12000 Series Performance Route Processor 1 Cisco 12000 Series - Multi-Service Blade Controller 1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM) 1 Cisco 12000 Series SPA Interface Processor-601/501/401 1 Cisco 12000 Series SPA Interface Processor-600 3 Management Ethernet 6 PLIM_QOS 1 MgmtMultilink 5 SONET/SDH 2 T3 3 Multilink network interface(s) 28 T1 21 E1 21 Serial network interface(s) 5 GigabitEthernet/IEEE 802.3 interface(s) 4 Asynchronous Transfer Mode 1018k bytes of non-volatile configuration memory. 3623092k bytes of disk0: (Sector size 512 bytes). 3623092k bytes of disk1: (Sector size 512 bytes). 65536k bytes of Flash internal SIMM (Sector size 256k).
Configuration register on node 0/0/CPU0 is 0x102 Boot device on node 0/0/CPU0 is disk0: Package active on node 0/0/CPU0: c12k-fwding, V 4.1.0[DT_IMAGE], Cisco Systems, at disk0:c12k-fwding-4.1.0.15 I Built on Thu May 6 17:07:57 DST 2010 By sjc-lds-364 in /auto/ioxbuild6/production/4.1.0.DT_IMAGE/c12k/workspa ce for pie
2-22
c12k-doc, V 4.1.0[DT_IMAGE], Cisco Systems, at disk0:c12k-doc-4.1.0
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
Built on Thu May 6 20:36:06 DST 2010
show platform Command: Example
The show platform command displays information on router resources. In EXEC mode, the show platform command displays the resources assigned to the secure domain router (SDR) that you are managing. In administration EXEC mode, the show platform command displays all router resources.
Note Secure Domain Routers (SDRs) are introduced in Chapter 3, “Configuring General Router Features.”
The following EXEC mode example displays the nodes assigned to the default SDR, which is called the owner SDR:
RP/0/0/CPU0:router# show platform Mon May 31 02:15:07.484 DST Node Type PLIM State Config State
----------------------------------------------------------------------------­0/0/CPU0 PRP(Active) N/A IOS XR RUN PWR,NSHUT,MON 0/1/CPU0 L3 Service Eng N/A Admin Down PWR,SHUT,MON 0/2/CPU0 L3LC Eng 3 OC3-ATM-4 IOS XR RUN PWR,NSHUT,MON 0/3/CPU0 L3LC Eng 5+ Jacket Card IOS XR RUN PWR,NSHUT,MON 0/3/1 SPA SPA-IPSEC-2G-2 READY PWR,NSHUT 0/3/2 SPA SPA-1XCHSTM1/OC READY PWR,NSHUT 0/4/CPU0 L3LC Eng 5 Jacket Card IOS XR RUN PWR,NSHUT,MON 0/4/0 SPA SPA-5X1GE READY PWR,NSHUT
Verifying the System After Initial Boot
The following administration EXEC mode example shows all router nodes:
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)# show platform Mon May 31 02:18:17.048 DST Node Type PLIM State Config State
----------------------------------------------------------------------------­0/0/CPU0 PRP(Active) N/A IOS XR RUN PWR,NSHUT,MON 0/1/CPU0 L3 Service Eng N/A Admin Down PWR,SHUT,MON 0/2/CPU0 L3LC Eng 3 OC3-ATM-4 IOS XR RUN PWR,NSHUT,MON 0/3/CPU0 L3LC Eng 5+ Jacket Card IOS XR RUN PWR,NSHUT,MON 0/3/1 SPA SPA-IPSEC-2G-2 READY PWR,NSHUT 0/3/2 SPA SPA-1XCHSTM1/OC READY PWR,NSHUT 0/4/CPU0 L3LC Eng 5 Jacket Card IOS XR RUN PWR,NSHUT,MON 0/4/0 SPA SPA-5X1GE READY PWR,NSHUT 0/17/CPU0 CSC6(P) N/A PWD PWR,NSHUT,MON 0/18/CPU0 SFC6 N/A PWD PWR,NSHUT,MON 0/19/CPU0 SFC6 N/A PWD PWR,NSHUT,MON 0/20/CPU0 SFC6 N/A PWD PWR,NSHUT,MON 0/24/CPU0 ALARM6 N/A PWD PWR,NSHUT,MON 0/25/CPU0 ALARM6 N/A PWD PWR,NSHUT,MON 0/28/CPU0 GSR6-BLOWER N/A PWD PWR,NSHUT,MON RP/0/0/CPU0:router# end
Note LCs in Cisco CRS routers are called modular services cards (MSCs).
For more information on node IDs, see Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router.
For more information on the show platform command, see Cisco IOS XR Interface and Hardware Component Command Reference for the Cisco XR 12000 Series Router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-23
Verifying the System After Initial Boot
show redundancy Command: Example
The following example shows how to display information about the active and standby (inactive) RPs by entering the show redundancy command:
RP/0/0/CPU0:router# show redundancy
Mon May 31 02:22:27.482 DST Redundancy information for node 0/0/CPU0: ========================================== Node 0/0/CPU0 is in ACTIVE role Node 0/0/CPU0 has no valid partner
Reload and boot info
---------------------­PRP reloaded Mon May 10 16:47:10 2010: 2 weeks, 6 days, 9 hours, 35 minutes ago Active node booted Mon May 10 16:47:10 2010: 2 weeks, 6 days, 9 hours, 35 minutes ago
Active node reload "Cause: Turboboot completed successfully"
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
2-24
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
show environment Command: Example
To display environmental monitor parameters for the system, use the show environment command in EXEC or administration EXEC mode. The show environment [options] command syntax is used.
Enter the show environment ? command to display the command options:
RP/0/0/CPU0:router# show environment temperatures
The following example shows temperature information for a Cisco XR 12000 Series Router:
Mon May 31 02:27:06.397 DST R/S/I Modules Sensor Temp. (deg C)
0/0/* host Inlet 32.5 host Hot 34.0 0/2/* host Inlet 31.0 host Hot 39.0 0/3/* host Inlet 32.0 host Hot 42.0 spa2 Chan4 50.0 spa2 Chan3 43.0 spa2 Chan2 48.0 spa2 Chan1 39.0 spa2 Local 48.0 spa1 Chan4 37.0 spa1 Chan3 33.0 spa1 Chan2 39.0 spa1 Chan1 33.0 spa1 Local 35.0 0/4/* host Hot 38.5 host Inlet 36.5 spa0 DownStream_ 35.0 spa0 UpStream_ 31.5

Where to Go Next

For more information, see Cisco IOS XR Interface and Hardware Component Command Reference for the Cisco XR 12000 Series Router.
Where to Go Next
For information on configuring basic router features, see Configuring General Router Features.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
2-25
Where to Go Next
Chapter 2 Bringing Up the Cisco IOS XR Software on a Standalone Router
2-26
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01

Contents

CHAPTER
3

Configuring General Router Features

This chapter describes how to communicate with the router using the command-line interface (CLI), and it also shows basic Cisco IOS XR software configuration management.
Secure Domain Routers, page 3-27
Connecting and Communicating with the Router, page 3-28
Logging In to a Router or an SDR, page 3-36
CLI Prompt, page 3-37
User Access Privileges, page 3-38
Navigating the Cisco IOS XR Command Modes, page 3-43
Managing Configuration Sessions, page 3-49
Configuring the SDR Hostname, page 3-66
Configuring the Management Ethernet Interface, page 3-66
Manually Setting the Router Clock, page 3-72
Where to Go Next, page 3-74

Secure Domain Routers

Cisco XR 12000 Series Routers can be partitioned into multiple, independent routers known as secure domain routers (SDRs). Every router is shipped with a default SDR, which is called the owner SDR, by
default, owns all RPs and Line Cards (LCs) installed in the routing system. To build additional SDRs, you must perform the following steps:
Create each SDR using configuration commands
Name the SDR
Assign RP, PRP and LCs to the SDR
Configure the interfaces on the LCs on the new SDR
An SDR is a group of cards within a router that is configured to operate as an independent router. SDRs that are created with configuration commands are called SDRs and are configured with custom names to distinguish them from the owner SDR and other named SDRs.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-27

Connecting and Communicating with the Router

Note In previous releases, SDRs were called logical routers (LRs).
SDRs perform routing functions in the same manner as a physical router, but share some chassis resources with the rest of the system. For example, the applications, configurations, protocols, and routing tables assigned to an SDR belong to that SDR only, but other functions, such as chassis control, switch fabric, and partitioning, are shared with the rest of the system.
To manage the owner SDR, you must connect to the active RP for the owner SDR. In administration configuration mode, you can define new SDRs and assign resources to them (such as DRPs, MSCs, and line cards). In configuration mode, you can configure the operation of the owner SDR. Although you can reassign cards from one SDR to another, you cannot configure and manage cards assigned to a named SDR. To manage cards assigned to a named SDR, you must connect to the appropriate named SDR.
When you manage a named SDR, you must connect to the active RP for that named SDR. You can connect to the named SDR using any of the connection methods you use for the owner SDR (for example, you can connect through the console port or the Management Ethernet interface), and you have control over only the cards assigned to that named SDR. For example, you cannot configure and manage interfaces on LCs assigned to the owner SDR or other SDRs unless you connect directly to those SDRs.
Chapter 3 Configuring General Router Features
Note Cisco IOS XR Software Release 3.2 supports multiple SDRs on Cisco XR 12000 Series Routers.
Cisco IOS XR Software Release 3.3 and later releases support multiple SDRs on the Cisco CRS routers and Cisco XR 12000 Series Routers. For more information, see Cisco IOS XR System Management
Configuration Guide for the Cisco XR 12000 Series Router.
Connecting and Communicating with the Router
To manage or configure a router running Cisco IOS XR software, you must first connect to the router using a terminal or a PC. Before you connect to the router, you must determine which router entity to manage. You can manage the following router entities:
Owner SDR. Connect to the designated shelf controller (DSC).
Router or multishelf system hardware. Connect to the DSC.
Named SDR. For Cisco XR 12000 Series Routers, connect to the RP that serves as the DSDRSC for
that named SDR.
Connections are made either through a direct physical connection to the console port of the DSC or DSDRSC or from a remote location using a modem or an Ethernet connection that leads to the DSC or DSDRSC.
Figure 3-1 shows the DRP PLIM connections.
Figure 3-2 shows the performance route processor 2 (PRP-2) connections for a
Cisco XR 12000 Series Router.
Figure 3-3 shows the performance route processor 3(PRP-3) connections for a
Cisco XR 12000 Series Router.
3-28
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
The first time a router is started, you must use a direct connection to the DSC Console port to connect to the router and enter the initial configuration information. When the router is directly connected to the Console port, enter CLI commands at a terminal or at a computer running terminal emulation software. This direct Console port connection is useful for entering initial configurations and performing some debugging tasks.
This chapter describes some of the tasks to perform during your initial configuration. One of those tasks is the configuration of the Management Ethernet interface, which is described in the “Configuring the
Management Ethernet Interface” section on page 3-66. After the Management Ethernet interface is
configured, most router management and configuration sessions take place over an Ethernet network connected to the Management Ethernet interface. SNMP agents also use the network connection.
You can use the modem connection for remote communications with the router. If the Management Ethernet interface fails, the modem connection serves as the alternate remote communications path.
Connecting and Communicating with the Router
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-29
Connecting and Communicating with the Router
STATUS
PRIMARY
CLASS 1 LASER PRODUCT LASERPRODUKT DER KLASSE 1 PRODUIT LASER DE CLASSE 1
PRODUCTO LASER CLASE 1
11
CLEAN
CONNECTOR
WITH ALCOHOL WIPES BEFORE CONNECTING
PIDVIDPIDVID
SN
CLEI
FDA
AUX 0
AUX 1
MGMT ETH 1
MGMT ETH 0
B1
CRS-DRP-ACC
138093
Network
CPU0
AUX connection
CPU0 Console
connection
CPU1
AUX connection
CPU1 Console
connection
Remote CLI, CWI,
XML, or SNMP communication
Management
Ethernet
connections
for out-of-band
network
communication
CPU0 Ethernet
CPU1 Ethernet
RJ-45 cable
RJ-45 cable
RJ-45 cable
RJ-45 cable
Local terminal or
terminal server for
CLI communication
Remote terminal for
CLI communication
B1
252290
1
0
0
1
2
2
3
4-10GE
3
CLEAN
CONNECTOR
WITH ALCOHOL
WIPES BEFORE
CONNECTING
STATUS
1
Chapter 3 Configuring General Router Features
Figure 3-1 Communication Ports on the DRP PLIM
3-30
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
ACT
SIG
ACT
SIG
SLOT-1
SLOT-0
CONSOLE ETH 2AUX
RESET
PERFORMANCE ROUTE PROCESSOR 2
BITS 1BITS 0
DATA
LINK
DATA
LINK
ETH 1ETH 0
Terminal connection
Modem connection
User-removable flash disk1 stores installation PIE files
A second internal flash disk0 stores installed software and active configurations
LED status displays (alphanumeric)
Remote CLI, CWI, XML,
or SNMP communication.
Remote file storage
Ethernet cable
Network
Local terminal or
terminal server for
CLI communication
RJ-45 cable
Remote terminal for
CLI communication
RJ-45 cable
Management Ethernet connection for out-of-band network communication
Connecting and Communicating with the Router
Figure 3-2 Communication Ports on the PRP-2 for a Cisco XR 12000 Series Router
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-31
Connecting and Communicating with the Router
Figure 3-3 Communication Ports on the PRP-3
1 3 4 52
1 Ejector Lever
2 Handle
3 External Compact Flash
4 Reset button
5 Alphanumeric LEDs
Chapter 3 Configuring General Router Features
A
K
T
A
INK
IN
L
L
D
T
TA A
D
T
G
G
I
I
AC
AC
S
S
RESET
CONSOLE
AUXBITS 1BITS 0ETH 1ETH 0
PERFORMANCE RP 3
272359
The following sections describe three ways to connect to the router:
Establishing a Connection Through the Console Port, page 3-32
Establishing a Connection Through a Terminal Server, page 3-34
Establishing a Connection Through the Management Ethernet Interface, page 3-36

Establishing a Connection Through the Console Port

To connect to the router through the console port, perform the following procedure.
SUMMARY STEPS
1. Identify the active RP or DRP.
2. Connect a terminal to the Console port of the active RP or DRP.
3. Start the terminal emulation program.
4. Press Enter.
5. Log in to the router.
3-32
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
DETAILED STEPS
Command or Action Purpose
Step 1
Step 2
Identify the active RP or DRP. Identifies the RP or DRP to which you must connect in the next step.
Connect a terminal to the Console port of the active RP or DRP.
Connecting and Communicating with the Router
This step is not required when the router hosts only one RP.
On a Cisco XR 12000 Series Router, the active RP is identified by the
alphanumeric display: ACTV RP.
Establishes a communications path to the router.
During the initial setup, you can communicate with the router only
through the console port of the active RP.
Router console port is designed for a serial cable connection to a
terminal or a computer that is running a terminal emulation program.
Terminal settings are:
Bits per second: 9600 (default value)
Step 3
Data bits: 8
Parity: None
Stop bit: 2
Flow control: None
For information on the cable requirements for the console port, see the
hardware documentation listed in the “Related Documents” section on
page x.
Start the terminal emulation program. (Optional) Prepares a computer for router communications.
This step is not required if you are connecting through a terminal.
Terminals send keystrokes to, and receive characters from, another
device. If you connect a computer to the Console port, you must use a terminal emulation program to communicate with the router. For instructions on using a terminal emulation program, see the hardware documentation listed in the “Related Documents” section on page x.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-33
Connecting and Communicating with the Router
Command or Action Purpose
Step 4
Step 5
Press Enter. Initiates communication with the router.
Log in to the router. Establishes your access rights for the router management session.
Chapter 3 Configuring General Router Features
If no text or router prompt appears when you connect to the Console
port, press Enter to initiate communications.
If no text appears when you press Enter and the router has been
started recently, give the router more time to complete the initial boot procedure, then press Enter.
If the router has no configuration, the router displays the prompt:
Enter root-system username:. For more information on when a
standalone router is starting up for the first time, see Chapter 2,
“Bringing Up the Cisco IOS XR Software on a Standalone Router.”
If the router has been configured, the router displays the prompt:
Username:
Enter the username and password, as described in the “Logging In to
a Router or an SDR” section on page 3-36.
After you log in, the router displays the CLI prompt, which is
described in the “CLI Prompt” section on page 3-37.

Establishing a Connection Through a Terminal Server

A terminal server connection provides a way to access the Console port from a remote location. It is less expensive to connect to the router through the Management Ethernet interface (because you do not have the additional cost of a terminal server). However, if you need to perform tasks that require Console port access from a remote location, a terminal server is the best method.
The procedure for connecting to the router through a terminal server is similar to the procedure for directly connecting through the Console port. For both connection types, the physical connection takes place through the Console port. The difference is that the terminal server connects directly to the Console port, and you must use a Telnet session to establish communications through the terminal server to the router.
To establish a connection through a terminal server, perform the following procedure.
SUMMARY STEPS
1. Install and configure the terminal server.
2. Connect the terminal server to the Console port of the target RP or DRP.
3. Power on the router.
3-34
4. Identify the target RP or DRP.
5. telnet access-server-address port
6. Press Enter.
7. Log in to the router.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
DETAILED STEPS
Command or Action Purpose
Step 1
Install and configure the terminal server.
Step 2
Connect the terminal server to the Console port of the target RP or DRP.
Connecting and Communicating with the Router
Prepares the terminal server for communications with the router and with Telnet clients.
This step is usually preformed once.
For router access, users need the Telnet server IP address and port
number for each RP they access.
For additional information on configuring terminal services, including
terminal servers and templates, see Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router.
Establishes a communications path between the terminal server and the router.
During the initial router setup, you can communicate with the router
only through the Console port of the primary RP.
The router Console port is designed for a serial cable connection to a
terminal or terminal server.
The terminal settings are:
Bits per second: 9600(default value)
Step 3
Step 4
Step 5
Data bits: 8
Parity: None
Stop bit: 2
Flow control: None
For information on the cable requirements for the Console port, see
the hardware documentation listed in the “Related Documents”
section on page x.
Power on the router. Starts the router.
This step is required only if the router power is not on.
For information on power installation and controls, see the hardware
documentation listed in the “Related Documents” section on page x.
Identify the target RP or DRP. Identifies the RP or DRP to which you connect in the next step.
This step is not required when the router hosts only one RP or DRP.
On a Cisco XR 12000 Series Router, the active RP is identified by the
alphanumeric display: ACTV RP.
If you cannot see the RPs, use a Management Ethernet interface
connection to determine which RP is active, or establish terminal server connections to both RPs and then try both.
telnet access-server-address port
Establishes a Telnet session with the terminal server.
OL-24755-01
Replace access-server-address with the IP address of the terminal
server, and replace port with the terminal server port number that connects to the target RP Console port.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-35
Chapter 3 Configuring General Router Features

Logging In to a Router or an SDR

Command or Action Purpose
Step 6
Press Enter. (Optional) Initiates communications with the RP or DRP.
If no text or router prompt appears when you start the Telnet session,
press Enter to initiate communications.
If the router has no configuration, the router displays the prompt:
Enter root-system username: Enter the root-system username and
password when prompted.
If the router has been configured, the router displays the prompt:
Username:
Step 7
Log in to the router. Establishes your access rights for the router management session.
Enter a username and password when prompted.

Establishing a Connection Through the Management Ethernet Interface

The Management Ethernet interface allows you to manage the router using a network connection. Before you can use the Management Ethernet interface, the interface must be configured as described in the
“Configuring the Management Ethernet Interface” section on page 3-68.
After it is configured, the network connection takes place between client software on a workstation computer and a server process within the router. The type of client software you use depends on the server process to use. The Cisco IOS XR software supports the following client and server services:
Telnet clients can connect to a Telnet server in the router. The Telnet server is disabled by default
and can be enabled with the telnet ipv4 server or telnet ipv6 server command in global configuration mode.
Secure Shell (SSH) clients can connect to an SSH server in the router. The SSH server is disabled
by default and can be enabled with the ssh server command in global configuration mode. The SSH server handles both Secure Shell Version 1 (SSHv1) and SSHv2 incoming client connections for both IPv4 and IPv6 address families. The SSHv2 client is enhanced and can now execute commands remotely without invoking a secure interactive session.
To start a Telnet network connection, start the Telnet client software with a command similar to the following:
telnet ManagementEthernetInterfaceIPaddress
For specific instructions on connecting to the router through a Telnet or SSH client, see the instructions for that software.
Ask your system administrator for the IP address of the Management Ethernet interface.
When the Telnet session is established, the router prompts you to log in, as described in the “Logging In
to a Router or an SDR” section on page 3-36.
Logging In to a Router or an SDR
The login process can require users to enter a password or a username and password before accessing the router CLI. The user groups to which your username is assigned determine which commands you can use.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-36
OL-24755-01
Chapter 3 Configuring General Router Features
If you log in to a router with a single SDR configured (this is the default configuration), you can manage the entire router.. If you log in to a named SDR, you can manage only that SDR. For more information on SDRs, see the “Secure Domain Routers” section on page 3-27.
When you log in, the username and password may be validated by any of the following services:
Usernames configured on the router (username command in global configuration mode)
Root-system usernames configured on the owner SDR
Passwords configured for the router console and auxiliary ports (password or secret command in
line configuration mode)
RADIUS server
TAC ACS+ serv e r
The username and password validation method that your router uses is determined by the router configuration. For information on configuring username and password validation methods, see Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router. For information on which username and password to use, see your system administrator.
To log in to the router, enter your username and password when prompted. For example:
User Access Verification

CLI Prompt

Note Passwords are case sensitive. To log in to an SDR using a root-system username from the owner SDR,
CLI Prompt
Username: iosxr Password: password RP/0/0/CPU0:router#
enter the username in the following format: username@admin. To support admin login, local database authentication must be enabled with the aaa authentication login remote local command. For more information, see Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router.
After you log in, the router displays the CLI prompt, which is described in the “CLI Prompt” section on
page 3-37. The command set that you can use is determined by the privileges assigned to your username.
For information on how privileges are assigned to usernames, see Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router.
After you log in, you see the CLI prompt for the Cisco IOS XR software. This prompt identifies the router or SDR to which you are issuing commands. The CLI prompt represents the path, through the router, to the CPU that executes the commands you enter. The syntax for the CLI prompt is: type/rack/slot/module: router-name#. Table 3 -1 describes the CLI prompt.
OL-24755-01
Table 3-1 CLI Prompt Description
Prompt Syntax Component Description
type Type of interface or card with which you are communicating. For
most user communication tasks, the type is “RP”.
rack Rack number. In a standalone router, the rack number is always “0”.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-37

User Access Privileges

Chapter 3 Configuring General Router Features
Table 3-1 CLI Prompt Description (continued)
Prompt Syntax Component Description
slot Slot in which the RP or DRP is installed. In a
Cisco XR 12000 Series Router, the physical slot number can be 0 to 15, and there can be multiple SDRs, each of which is represented by an RP.
module Entity on a card that executes user commands or communicates with
a port (interface). For executing commands from the EXEC prompt, the module is the “CPU0” of the RP. “CPU0” also controls the forwarding and operating system (OS) functions for the system. DRPs have two processors: CPU0 and CPU1.
router-name Hostname of the router or SDR. The hostname is usually defined
during initial configuration of the router, as described in the
“Configuring the SDR Hostname” section on page 3-66.
For example, the following prompt indicates that the CLI commands are executed on the RP in rack 0, slot RP0, by the “CPU0” module on a router named “router”:
RP/0/0/CPU0:router#
User Access Privileges
When you log in to the router, your username and password are used to determine if you are authorized to access the router. After you successfully log in, your username is used to determine which commands you are allowed to use. The following sections provide information on how the router determines which commands you can use:
User Groups, Task Groups, and Task IDs, page 3-39
Predefined User Groups, page 3-40
Displaying the User Groups and Task IDs for Your User Account, page 3-41
3-38
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features

User Groups, Task Groups, and Task IDs

The Cisco IOS XR software ensures security by combining tasks a user wants to perform (task IDs) into groups, defining which router configuration and management functions users can perform. This policy is enabled by the definition of:
User groups—Collection of users that share similar authorization rights on a router.
Task groups—Definition of collection of tasks identified by unique task IDs for each class of action.
Task IDs—Definition of permission to perform particular tasks; pooled into a task group that is then
assigned to users.
The commands you can perform are defined by the user groups to which you belong. Within the Cisco IOS XR software, the commands for a particular feature, like access control lists, are assigned to tasks. Each task is uniquely identified by a task ID. To use a particular command, your username must be associated with the appropriate task ID.
The association between a username and a task ID takes place through two intermediate entities, the user group and task group.
The user group is a logical container used to assign the same task IDs to multiple users. Instead of assigning task IDs to each user, you can assign them to the user group. Then, you can assign users to that user group. When a task is assigned to a user group, you can define the access rights for the commands associated with that task. These rights include “read”, “write”, “execute”, and “notify”.
User Access Privileges
The task group is also a logical container, but it is used to group tasks. Instead of assigning task IDs to each user group, you assign them to a task group. This allows you to quickly enable access to a specific set of tasks by assigning a task group to a user group.
To summarize the associations, usernames are assigned to user groups, which are then assigned to task groups. Users can be assigned to multiple user groups, and each user group can be assigned to one or more task groups. The commands that a user can execute are all those commands assigned to the tasks within the task groups that are associated with the user groups to which the user belongs.
Users are not assigned to groups by default and must be explicitly assigned by an administrator.
The following example shows how you can display all task IDs available on the system with the show task supported command.
RP/0/RP0/CPU0:router# show task supported
bgp ospf hsrp isis route-map route-policy static vrrp cef lpts iep rib multicast mpls-te mpls-ldp mpls-static ouni fabric bundle network transport
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-39
User Access Privileges
ppp hdlc
--More--
Note Only the root-system users, root-lr users, or users associated with the WRITE:AAA task ID can
configure task groups. (The root-lr user has the highest level of privileges in an SDR. In previous releases, SDRs were called logical routers [LRs].)

Predefined User Groups

Cisco IOS XR software includes a set of predefined user groups that meets the needs of most organizations. Tab le 3 -2 describes predefined user groups.
Table 3-2 Predefined User Group Descriptions
User Group Privileges
root-system Display and execute all commands for all SDRs in the system.
root-lr Display and execute all commands within a single SDR.
sysadmin Perform system administration tasks for the router, such as
serviceadmin Perform service administration tasks for the router, such as
netadmin Configure network protocols, such as BGP
operator Perform day-to-day monitoring activities, and have limited
cisco-support Debug and troubleshoot features (usually, used by Cisco Technical
1. NTP stands for Network Time Protocol
2. BGP stands for Border Gateway Protocol
3. Open Shortest Path First
Chapter 3 Configuring General Router Features
maintaining where the core dumps are stored or setting up the NTP clock.
configuring firewall and sbc.
2
and OSPF3 (usually used
by network administrators).
configuration rights.
Support personnel).
1
3-40
Although the predefined user groups are sufficient for the needs of most organizations, administrators can configure their own groups. For more information, see Cisco IOS XR System Security Configuration
Guide for the Cisco XR 12000 Series Router.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features

Displaying the User Groups and Task IDs for Your User Account

To display the user groups and task IDs associated with your account, enter the show user command in EXEC mode. Table 3 -3 summarizes the options available for this command.
Table 3-3 Options to Display Information About Your Account
Command Description
show user Displays your user name.
show user group Displays the user groups assigned to your
account.
show user tasks Displays the task IDs assigned to your account.
show user all Displays all user groups and task ID information
for your account.
show aaa usergroup group-name Displays the task IDs assigned to a user group.
User Access Privileges
Examples
The following examples show how to view user privileges:
show user Command: Example, page 3-41
show user tasks Command: Example, page 3-41
show user group Command: Example, page 3-42
show aaa usergroup Command: Example, page 3-42
show user Command: Example
To display your username, enter the show user command:
RP/0/0/CPU0:router# show user
username1
show user tasks Command: Example
To display the tasks assigned to your account and your rights to those tasks, enter the show user tasks command:
RP/0/0/CPU0:router# show user tasks Mon May 31 02:52:13.335 DST Task: aaa : READ WRITE EXECUTE DEBUG Task: acl : READ WRITE EXECUTE DEBUG Task: admin : READ WRITE EXECUTE DEBUG Task: ancp : READ WRITE EXECUTE DEBUG Task: atm : READ WRITE EXECUTE DEBUG Task: basic-services : READ WRITE EXECUTE DEBUG Task: bcdl : READ WRITE EXECUTE DEBUG Task: bfd : READ WRITE EXECUTE DEBUG Task: bgp : READ WRITE EXECUTE DEBUG Task: boot : READ WRITE EXECUTE DEBUG Task: bundle : READ WRITE EXECUTE DEBUG Task: cdp : READ WRITE EXECUTE DEBUG
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-41
User Access Privileges
Task: cef : READ WRITE EXECUTE DEBUG Task: cgn : READ WRITE EXECUTE DEBUG Task: cisco-support : READ WRITE EXECUTE DEBUG (reserved) Task: config-mgmt : READ WRITE EXECUTE DEBUG Task: config-services : READ WRITE EXECUTE DEBUG Task: crypto : READ WRITE EXECUTE DEBUG Task: diag : READ WRITE EXECUTE DEBUG Task: drivers : READ WRITE EXECUTE DEBUG Task: dwdm : READ WRITE EXECUTE DEBUG Task: eem : READ WRITE EXECUTE DEBUG Task: eigrp : READ WRITE EXECUTE DEBUG Task: ethernet-services : READ WRITE EXECUTE DEBUG
show user group Command: Example
To display the user groups assigned to your user account, enter the show user group command:
RP/0/0/CPU0:router# show user group Mon May 31 02:53:59.933 DST root-system, cisco-support
show user all Command: Example
Chapter 3 Configuring General Router Features
To display all user groups and task ID information for your account, enter the show user all command:
RP/0/0/CPU0:router# show user all Mon May 31 02:54:51.446 DST Username: cisco Groups: root-system, cisco-support Authenticated using method local User cisco has the following Task ID(s):
Task: aaa : READ WRITE EXECUTE DEBUG Task: acl : READ WRITE EXECUTE DEBUG Task: admin : READ WRITE EXECUTE DEBUG Task: ancp : READ WRITE EXECUTE DEBUG Task: atm : READ WRITE EXECUTE DEBUG Task: basic-services : READ WRITE EXECUTE DEBUG Task: bcdl : READ WRITE EXECUTE DEBUG Task: bfd : READ WRITE EXECUTE DEBUG Task: bgp : READ WRITE EXECUTE DEBUG Task: boot : READ WRITE EXECUTE DEBUG Task: bundle : READ WRITE EXECUTE DEBUG Task: cdp : READ WRITE EXECUTE DEBUG Task: cef : READ WRITE EXECUTE DEBUG Task: cgn : READ WRITE EXECUTE DEBUG Task: cisco-support : READ WRITE EXECUTE DEBUG (reserved) Task: config-mgmt : READ WRITE EXECUTE DEBUG Task: config-services : READ WRITE EXECUTE DEBUG Task: crypto : READ WRITE EXECUTE DEBUG Task: diag : READ WRITE EXECUTE DEBUG
show aaa usergroup Command: Example
To display the rights assigned to a user group, enter the show aaa usergroup group-name command:
RP/0/0/CPU0:router# show aaa usergroup root-system Mon May 31 02:56:45.975 DST User group 'root-system' Inherits from task group 'root-system'
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-42
OL-24755-01
Chapter 3 Configuring General Router Features
User group 'root-system' has the following combined set of task IDs (including all inherited groups): Task: aaa : READ WRITE EXECUTE DEBUG Task: acl : READ WRITE EXECUTE DEBUG Task: admin : READ WRITE EXECUTE DEBUG Task: ancp : READ WRITE EXECUTE DEBUG Task: atm : READ WRITE EXECUTE DEBUG Task: basic-services : READ WRITE EXECUTE DEBUG Task: bcdl : READ WRITE EXECUTE DEBUG Task: bfd : READ WRITE EXECUTE DEBUG Task: bgp : READ WRITE EXECUTE DEBUG Task: boot : READ WRITE EXECUTE DEBUG Task: bundle : READ WRITE EXECUTE DEBUG Task: cdp : READ WRITE EXECUTE DEBUG Task: cef : READ WRITE EXECUTE DEBUG Task: cgn : READ WRITE EXECUTE DEBUG Task: config-mgmt : READ WRITE EXECUTE DEBUG Task: config-services : READ WRITE EXECUTE DEBUG Task: crypto : READ WRITE EXECUTE DEBUG Task: diag : READ WRITE EXECUTE DEBUG

Navigating the Cisco IOS XR Command Modes

Navigating the Cisco IOS XR Command Modes
The Cisco IOS XR Software has different command modes. Each mode provides access to a subset of commands used to configure, monitor, and manage the router. Access to a mode is determined by your user group assignments. The following sections describe the navigation of the command modes:
Identifying the Command Mode in the CLI Prompt, page 3-44
Summary of Common Command Modes, page 3-45
Entering EXEC Commands from a Configuration Mode, page 3-47
Command Mode Navigation Example, page 3-48
Figure 3-4 illustrates the basic command mode navigation for the CLI. Only a small sample of the
possible configuration modes is shown.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-43
Navigating the Cisco IOS XR Command Modes
149947
EXEC mode
Login
Interface configuration submode
Configuration submode examples
Router configuration submode
Line template configuration submode
Task group configuration submode
Global configuration modeAdministration configuration mode
Logical router configuration submode
Administration EXEC mode
Figure 3-4 Example of Command Mode Navigation in Cisco IOS XR software
Chapter 3 Configuring General Router Features

Identifying the Command Mode in the CLI Prompt

The command mode is identified in the CLI prompt after the router name.
When the router enters global configuration mode from the EXEC mode, the CLI prompt changes to include “(config)” after the router name:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)#
When the router enters interface configuration submode, the prompt changes to include “(config-if)” after the router name:
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-44
RP/0/0/CPU0:router(config)# interface POS 0/2/0/0 RP/0/0/CPU0:router(config-if)#
OL-24755-01
Chapter 3 Configuring General Router Features
Navigating the Cisco IOS XR Command Modes

Summary of Common Command Modes

Tabl e 3-4 summarizes the most common command modes of the Cisco IOS XR software and the
associated CLI prompts.
Table 3-4 Common Command Modes and CLI prompts
Command Mode Description
EXEC Automatically places the router in EXEC mode when logging in to an SDR running the
Cisco IOS XR software.
Example:
RP/0/0/CPU0:router#
EXEC mode enables a basic set of commands to display the operational state of an SDR and the Cisco IOS XR software. Most CLI commands in EXEC mode do not change the SDR operation. The most common EXEC commands are show commands (to display SDR configuration or operational data) and clear commands (to clear or reset SDR counters).
In EXEC mode, you can display the configuration of an SDRbut not the configuration of the system. The difference is that SDRs are defined in administration configuration mode, which is a submode of administration EXEC mode. SDRs are configured in global configuration mode.
Additional commands are available depending on the access privileges (user groups) assigned to your username. Minimal privileges also include a small set of EXEC commands for connecting to remote devices, changing terminal line settings on a temporary basis, and performing basic tests.
Administration EXEC Manages system resources. In administration EXEC mode, you can display the configuration of the
system but not the configuration of an SDR. The difference is that SDRs are defined in administration configuration mode, which is a submode of administration EXEC mode. SDRs are configured in global configuration mode.
Administration EXEC mode is used primarily to display system-wide parameters, configure the administration plane over the control Ethernet, and configure SDR. These operations are available only to users with the required root level access.
From EXEC mode, use the admin command to enter administration EXEC mode:
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)#
Administration configuration
Allows you to create SDRs and assign system resources to SDRs. Multishelf systems are also configured in administration configuration mode.
From administration EXEC mode, use the configure command to enter administration configuration submode:
RP/0/0/CPU0:router(admin)# configure RP/0/0/CPU0:router(admin-config)#
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-45
Chapter 3 Configuring General Router Features
Navigating the Cisco IOS XR Command Modes
Table 3-4 Common Command Modes and CLI prompts (continued)
Command Mode Description
Global configuration Global configuration mode is the starting point for SDR configuration. Commands entered in this
mode affect the SDR as a whole, rather than just one protocol or interface. Global configuration mode is also used for entering configuration submodes to configure specific elements, such as interfaces or protocols.
To enter global configuration mode, enter the configure command at the EXEC command prompt:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)#
Note The system prompt changes to router(config) to indicate that the router is now in global
configuration mode.
Configuration submodes
From the global configuration mode, you can also enter other, more specific command modes. These modes are available based on your assigned access privileges and include protocol-specific, platform-specific, and feature-specific configuration modes.
In the following example, MPLS LDP configuration mode is entered from global configuration mode. The prompt for MPLS LDP configuration submode appears as config-ldp. The following command syntax is used for entering configuration MPLS LDP submode:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# mpls ldp RP/0/RP0/CPU0:router(config-ldp)#
Note The availability of any particular mode depends on the router features and the access rights
of the individual user. For example, a configuration mode for configuring access servers is not available on most routers.
Interface configuration The interface configuration submode is used to select and configure a hardware interface. To enter
interface configuration mode from global configuration mode, use an interface command. An interface configuration command always follows an interface global configuration command, which defines the interface type. The following command syntax is used for entering interface configuration submode:
RP/0/0/CPU0:router# interface POS 0/2/0/0 RP/0/RP0/CPU0:router(config-if)#
Router configuration The router configuration submode is used to select and configure a routing protocol, such as BGP,
OSPF, or IS-IS. The router protocol [protocol_options] command syntax is used for entering router configuration submode.
Replace protocol with the keyword for the protocol to configure. Replace protocol_options with any keywords and arguments required for that protocol. In the following example, the router enters the router configuration mode for BGP:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# router bgp 140 RP/0/0/CPU0:router(config-bgp)#
3-46
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Table 3-4 Common Command Modes and CLI prompts (continued)
Command Mode Description
Router submode configuration
Router configuration submodes are accessed from router configuration mode. The following command syntax is used for entering router address family configuration submode:
RP/0/0/CPU0:router(config)# router bgp 140 RP/0/0/CPU0:router(config-bgp)# address-family ipv4 multicast RP/0/0/CPU0:router(config-bgp-af)#
For more information, see the following Cisco documents:
Cisco IOS XR Routing Configuration Reference for the Cisco XR 12000 Series Router
Cisco IOS XR Routing Command Reference for the Cisco XR 12000 Series Router
ROM Monitor (ROMMON)
The ROM Monitor is a bootstrap program that initializes the hardware and boots the system when a router is powered on or reset. ROM Monitor mode is also known as ROMMON, which reflects the CLI prompt for the mode.
rommon B1>
Navigating the Cisco IOS XR Command Modes
During normal operation, users do not interact with ROMMON. This mode is accessed only by manually interrupting the boot process and placing the system in ROMMON. Once in ROMMON, you can perform ROM Monitor tasks, including reinstallation of the Cisco IOS XR software, password recovery, and other diagnostic tasks.
The ROM Monitor CLI mode is accessible only from a terminal connected directly to the Console port of the primary RP, a terminal-modem connection to the AUX port, or through a terminal server.
For information and instructions on using ROM Monitor mode, see Cisco IOS XR ROM Monitor Guide for the Cisco XR 12000 Series Router.
For information and instructions on using ROM Monitor mode, see Cisco IOS XR ROM Monitor Guide for information and instructions on using ROM Monitor mode.

Entering EXEC Commands from a Configuration Mode

EXEC commands can be executed from any configuration mode by preceding the command with the do keyword. Executing EXEC commands from a configuration mode allows you to display the state of the system without exiting the configuration mode. For example:
RP/0/0/CPU0:router(config)# do show version
Mon May 31 02:52:07.240 DST
Cisco IOS XR Software, Version 4.1.0[Default] Copyright (c) 2010 by Cisco Systems, Inc.
OL-24755-01
ROM: System Bootstrap, Version 12.0(20090226:235859) [rtauro-sw30346-33S 1.23dev(0.35)] DEVELOPMENT SOFTWARE Copyright (c) 1994-2009 by cisco Systems, Inc.
PE6_C12406 uptime is 2 weeks, 6 days, 10 hours, 4 minutes System image file is "disk0:c12k-os-mbi-4.1.0/mbiprp-rp.vm"
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-47
Navigating the Cisco IOS XR Command Modes
cisco 12406/PRP (7457) processor with 2097152K bytes of memory. 7457 processor at 1266Mhz, Revision 1.2
1 Cisco 12000 Series Performance Route Processor 1 Cisco 12000 Series - Multi-Service Blade Controller 1 Cisco 12000 4-Port ISE ATM Over SONET OC3/STM-1 Controller (4 ATM) 1 Cisco 12000 Series SPA Interface Processor-601/501/401 1 Cisco 12000 Series SPA Interface Processor-600 3 Management Ethernet 6 PLIM_QOS 1 MgmtMultilink 5 SONET/SDH 2 T3 3 Multilink network interface(s) 28 T1 21 E1 21 Serial network interface(s) 5 GigabitEthernet/IEEE 802.3 interface(s) 4 Asynchronous Transfer Mode 1018k bytes of non-volatile configuration memory. 3623092k bytes of disk0: (Sector size 512 bytes). 3623092k bytes of disk1: (Sector size 512 bytes). 65536k bytes of Flash internal SIMM (Sector size 256k).
Chapter 3 Configuring General Router Features
Configuration register on node 0/0/CPU0 is 0x102 Boot device on node 0/0/CPU0 is disk0: Package active on node 0/0/CPU0: c12k-fwding, V 4.1.0[DT_IMAGE], Cisco Systems, at disk0:c12k-fwding-4.1.0 Built on Thu May 6 17:07:57 DST 2010 By sjc-lds-364 in /auto/ioxbuild6/production/4.1.0.DT_IMAGE/c12k/workspace for pie
--More--

Command Mode Navigation Example

The following steps provide an example of command mode navigation:
Step 1 Start a session by logging in to the router and entering EXEC mode, as shown in the following example:
router con0_0_CPU0 is now available
Press Enter to get started.
User Access Verification
Username: iosxr Password:<secret> RP/0/0/CPU0:router#
From EXEC mode you can issue EXEC commands or enter global configuration mode. Examples of EXEC commands are the show commands used to display system status and clear commands to clear counters or interfaces.
Step 2 Add ? at the end of the prompt, or after a command, to display the available options:
RP/0/0/CPU0:router# show ?
3-48
MgmtMultilink Show trace data for the multilink controller component aaa Show AAA configuration and operational data
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
access-lists Access lists address-pool Local address pool adjacency Adjacency information af-ea AF-EA Platform details aliases Display alias commands app-obj APP-OBJ Show Commands aps SONET APS information aqsm AQSM show commands aqsmlib AQSMLIB show commands arm IP ARM information arp ARP show commands arp-gmp ARP show commands asic-errors ASIC error information atc Attractor Cache related atm ATM information atm-vcm Show atm_vcm component attractor Show commands for attractor process attribute IM Attributes operations information auto-rp Auto-RP Commands bcdl Show Bulk Content DownLoader information bfd BFD information
--More--

Managing Configuration Sessions

Note The commands available depend on the router mode and your user group assignments.
Step 3 If you belong to a user group that has configuration privileges, you can place the router in the global
configuration mode by entering the configure command:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)#
Step 4 From global configuration mode, you can place the router in a configuration submode, such as interface
configuration mode or a protocol-specific configuration mode.
In the following example, the router enters interface configuration mode and the user selects a POS interface for configuration. The command syntax is interface type rack/slot/module/port.
RP/0/0/CPU0:router(config)# interface POS 0/2/0/4 RP/0/0/CPU0:router(config-if)#
The command mode prompt changes from (config) to (config-if) and you can now enter configuration commands for the specified interface.
Step 5 To exit interface configuration mode and return to global configuration mode, enter the exit command.
To return to EXEC mode, enter the end command.
Managing Configuration Sessions
OL-24755-01
In the Cisco IOS XR software, you cannot change the running (active) configuration directly. Enter configuration changes into an inactive target configuration. When the target configuration is ready for use, you can apply that configuration to the router with the commit command. This two-stage process allows you to make, edit, and verify configuration changes before impacting the actual running state of the router.
Figure 3-5 shows the two-stage configuration process.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-49
Managing Configuration Sessions
EXEC mode
Global
configuration
mode
Administration
mode
Administration
configuration
mode
Stage 1: Enter configuration changes or load a saved configuration.
Save configuration
changes to a file.
Stage 2: "Commit" changes to the running configuration.
Figure 3-5 Two-Stage Configuration Process
Global configuration mode is used to configure SDR features, such as routing protocols and interfaces. Administration configuration mode is used to assign hardware components to SDRs.
Chapter 3 Configuring General Router Features
3-50
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
The following sections describe the management options for configuration sessions:
Displaying the Active Configuration Sessions, page 3-51
Starting a Configuration Session, page 3-52
Starting an Exclusive Configuration Session, page 3-53
Displaying Configuration Details with show Commands, page 3-54
Saving the Target Configuration to a File, page 3-60
Loading the Target Configuration from a File, page 3-61
Loading an Alternative Configuration at System Startup, page 3-61
Clearing All Changes to a Target Configuration, page 3-61
Committing Changes to the Running Configuration, page 3-62
Reloading a Failed Configuration, page 3-64
Exiting a Configuration Submode, page 3-64
Returning Directly to Configuration Mode from a Submode, page 3-65
Ending a Configuration Session, page 3-65
Managing Configuration Sessions
Aborting a Configuration Session, page 3-65
Configuring the SDR Hostname, page 3-66
Configuring the Management Ethernet Interface, page 3-66
Specifying the Management Ethernet Interface Name in CLI Commands, page 3-67
Displaying the Available Management Ethernet Interfaces, page 3-67
Configuring the Management Ethernet Interface, page 3-68

Displaying the Active Configuration Sessions

Before you start a configuration session, you should check if there are other configuration sessions in progress. More than one user can open a target configuration session at a time, allowing multiple users to work on separate target configurations.
The procedure for viewing the active configuration sessions depends on the type of configuration session. For administration configuration sessions, which assign hardware components in SDRs and multishelf systems, you must be in administration EXEC mode to view the active administration configuration sessions. For SDR configuration sessions, you must be in EXEC mode to view the active SDR configuration sessions.
To view the active administration configuration sessions, connect to the DSC and enter the show configuration sessions command in administration EXEC mode, as shown in the following example:
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)# show configuration sessions
OL-24755-01
Session Line User Date Lock 00000201-002180dd-00000000 vty0 cisco Thu Mar 16 14:47:08 2006
To view the active SDR configuration sessions, connect to the appropriate SDR and enter the show configuration sessions command in EXEC mode, as shown in the following example:
RP/0/0/CPU0:router# show configuration sessions
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-51
Managing Configuration Sessions
Current Configuration Session Line User Date Lock 00000201-002180dd-00000000 vty0 test Thu Mar 16 13:16:17 2006 00000201-001b307a-00000000 vty2 cisco Thu Mar 16 13:16:17 2006 *
If an asterisk (*) appears in the Lock column, the user is using an exclusive configuration session and you cannot start a configuration session until the exclusive configuration session closes. For more information, see the “Starting an Exclusive Configuration Session” section on page 3-53.
Note Configuration sessions for administration configuration and each SDR are managed independently. For
example, if a user locks the administration configuration, you can still configure an SDR if other users have not locked a configuration session for that SDR.

Starting a Configuration Session

When you place the router in global configuration mode or administration configuration mode using the configure command, a new target configuration session is created. The target configuration allows you to enter, review, and verify configuration changes without impacting the running configuration.
Chapter 3 Configuring General Router Features
Note The target configuration is not a copy of the running configuration. It has only the configuration
commands entered during the target configuration session.
While in configuration mode, you can enter all Cisco IOS XR software commands supported in that configuration mode. Each command is added to the target configuration. You can view the target configuration by entering the show configuration command in configuration mode. The target configuration is not applied until you enter the commit command, as described in the “Committing
Changes to the Running Configuration” section on page 3-62.
You can save target configurations to disk as nonactive configuration files. These saved files can be loaded, further modified, and committed at a later time. For more information, see the “Saving the Target
Configuration to a File” section on page 3-60.
Examples
The following examples show how to manage configuration sessions:
Simple Owner SDR Configuration: Example, page 3-52
Simple Administration Configuration Session: Example, page 3-53
Simple Owner SDR Configuration: Example
The following example shows a simple owner SDR configuration session in which the target configuration is created and previewed in global configuration mode:
RP/0/0/CPU0:router # configure RP/0/0/CPU0:router(config)# interface POS 0/2/0/1 RP/0/0/CPU0:router(config-if)# description faq RP/0/0/CPU0:router(config-if)# ipv4 address 10.10.10.10 255.0.0.0 RP/0/0/CPU0:router(config-if)# show configuration
3-52
Building configuration....
interface POS0/0/0/1 description faq
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
ipv4 address 10.10.10.10 255.0.0.0 end
Simple Administration Configuration Session: Example
The following example shows a simple administration configuration session in which the target configuration is created and previewed in administration configuration mode:
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)# configure RP/0/0/CPU0:router(admin-config)# sdr test RP/0/0/CPU0:router(admin-config-sdr:test)# location 0/1/SP RP/0/0/CPU0:router(admin-config-sdr:test)# show configuration
Building configuration... sdr test location 0/1/SP ! end

Starting an Exclusive Configuration Session

Managing Configuration Sessions
An exclusive configuration session allows you to configure the administration configuration or an SDR and lock out all users from committing configuration changes until you are done. Other users can still create and modify a target configuration, but they cannot commit those changes to the running configuration until you exit your exclusive configuration session.
During regular configuration sessions, the running configuration is locked whenever a commit operation is being performed. This automatic locking ensures that each commit operation is completed before the next one begins. Other users receive an error message if they attempt to commit a target configuration while another commit operation is under way.
To start an exclusive configuration session for an SDR, connect to that SDR and enter the configure exclusive command:
RP/0/0/CPU0:router# configure exclusive RP/0/0/CPU0:router(config)#
Note If the configuration is already locked by another user, the configure exclusive command fails. To view
locked and unlocked configuration sessions, see the “Displaying the Active Configuration Sessions”
section on page 3-51.
To start an exclusive configuration session for the administration configuration, connect to the DSC and enter the configure exclusive command in administration EXEC mode:
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)# configure exclusive RP/0/0/CPU0:router(admin-config)#
OL-24755-01
The running configuration is unlocked when the user who started the exclusive configuration session exits the configuration mode, as described in the “Ending a Configuration Session” section on page 3-65.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-53
Chapter 3 Configuring General Router Features
Managing Configuration Sessions

Displaying Configuration Details with show Commands

The following sections describe the following tasks:
Displaying the Running Configuration, page 3-54
Displaying a Sanitized Version of the Running Configuration, page 3-56
Displaying the Target Configuration, page 3-58
Displaying a Combined Target and Running Configuration, page 3-58
Displaying Configuration Error Messages and Descriptions, page 3-59
Displaying Configuration Error Messages Without Descriptions, page 3-60
Displaying Configuration Error Messages Produced While Loading a Configuration, page 3-60
Displaying the Running Configuration
The running configuration is the committed configuration that defines the router operations, and it is divided into the administration configuration and an SDR configuration for each SDR. The portion of the running configuration that you can view depends on the current CLI mode and SDR connection.
In EXEC mode and global configuration mode, you can view the SDR configuration for the SDR to which you are connected. When you are connected to the DSC and operating in administration EXEC and administration configuration mode, you can view the administration configuration, which includes hardware assignments for SDRs and multishelf systems.
To display the SDR portion of the running configuration, connect to the appropriate SDR and enter the show running-config command in EXEC or global configuration mode, as shown in the following example:
RP/0/0/CPU0:router(config)# show running-config
Building configuration... !! Last configuration change at 11:05:38 UTC Mon May 02 2005 by cisco ! hostname router logging console debugging telnet ipv4 server max-servers 5 username iosxr password 7 011F0706 group root-system group cisco-support ! ntp interface Loopback99 broadcast ! interface Loopback999 broadcast ! interface Loopback9999 broadcast ! authenticate max-associations 2000 ! interface Loopback0 ipv4 address 10.1.2.3 255.255.0.0 load-interval 0 !
3-54
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
interface Loopback1 ipv4 address 10.4.5.6 255.255.0.0 ! interface Loopback7 load-interval 0 ! interface Loopback2000 load-interval 0 ! interface Loopback2001 load-interval 0 ! interface Loopback2003 load-interval 0 ! interface MgmtEth0/RP1/CPU0/0 ipv4 address 10.11.12.13 255.255.0.0 ! interface POS0/0/0/0 shutdown ! interface POS0/0/0/1 shutdown ! interface POS0/0/0/2 shutdown ! interface POS0/0/0/3 shutdown ! interface POS0/3/0/0 shutdown ! interface POS0/3/0/1 shutdown ! interface POS0/3/0/2 shutdown ! interface POS0/3/0/3 shutdown ! interface preconfigure MgmtEth0/RP0/CPU0/0 shutdown ! router static address-family ipv4 unicast
0.0.0.0/0 MgmtEth0/RP1/CPU0/0 ! ! end
Managing Configuration Sessions
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-55
Managing Configuration Sessions
To display the administration portion of the running configuration, connect to the DSC and enter the show running-config command in administration EXEC or administration configuration mode, as shown in the following example:
RP/0/0/CPU0:router(admin)# show running-config
Building configuration... sdr test location 0/1/* primary ! username username1 secret 5 $1$SegP$9jcoyk09S5cM.h/tX36yj. group root-system ! end
Displaying a Sanitized Version of the Running Configuration
A sanitized running configuration report displays the contents of the running configuration without installation specific parameters. Some configuration details, such as IP addresses, are replaced with different addresses. The sanitized configuration can be used to share a configuration without exposing the configuration details.
In EXEC and global configuration mode, you can view the sanitized SDR configuration for the SDR to which you are connected. When you are connected to the SDR and operating in administration EXEC and administration configuration mode, you can view the sanitized administration configuration, which includes hardware assignments for SDRs.
To display the sanitized SDR portion of the running configuration, enter the show running-config sanitized command in EXEC or global configuration mode, as shown in the following example:
RP/0/0/CPU0:router(config)# show running-config sanitized
Chapter 3 Configuring General Router Features
Building configuration... !! Last configuration change at 11:05:38 UTC Mon May 02 2005 by <removed> ! hostname <removed> logging console debugging telnet ipv4 server max-servers 5 username <removed> password 7 <removed> group root-system group cisco-support ! ntp interface Loopback99 broadcast ! interface Loopback999 broadcast ! interface Loopback9999 broadcast ! authenticate max-associations 2000 ! interface Loopback0 ipv4 address 10.0.0.0 255.0.0.0 load-interval 0 !
3-56
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
interface Loopback1 ipv4 address 10.0.0.0 255.0.0.0 ! interface Loopback7 load-interval 0 ! interface Loopback2000 load-interval 0 ! interface Loopback2001 load-interval 0 ! interface Loopback2003 load-interval 0 ! interface MgmtEth0/RP1/CPU0/0 ipv4 address 10.0.0.0 255.0.0.0 ! interface POS0/0/0/0 shutdown ! interface POS0/0/0/1 shutdown ! interface POS0/0/0/2 shutdown ! interface POS0/0/0/3 shutdown ! interface POS0/3/0/0 shutdown ! interface POS0/3/0/1 shutdown ! interface POS0/3/0/2 shutdown ! interface POS0/3/0/3 shutdown ! interface preconfigure MgmtEth0/RP0/CPU0/0 shutdown ! router static address-family ipv4 unicast
0.0.0.0/0 MgmtEth0/RP1/CPU0/0 ! ! end
Managing Configuration Sessions
OL-24755-01
To display the sanitized administration portion of the running configuration, connect to the DSC and enter the show running-config sanitized command in administration EXEC or administration configuration mode, as shown in the following example:
RP/0/0/CPU0:router(admin)# show running-config sanitized Mon May 31 21:35:14.902 DST Building configuration... !! IOS XR Admin Configuration 4.1.0 sdr <removed> location 0/1/* location 0/4/* primary !
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-57
Managing Configuration Sessions
username <removed> group root-system group cisco-support secret 5 <removed> ! end
Displaying the Target Configuration
The target configuration includes the configuration changes that have been entered but not yet committed. These changes are not yet part of the running configuration.
You can view the target configuration in global configuration and administration configuration modes. You cannot view the target configuration in EXEC modes because the target configuration must be committed or abandoned before returning to EXEC or administration EXEC mode.
To display the target configuration changes you have entered for an SDR, enter the show configuration command in global configuration mode or in any submode, as shown in the following example:
RP/0/0/CPU0:router(config-if)# show configuration
Building configuration... interface POS0/3/0/3 description faq ipv4 address 10.1.1.1 255.0.0.0 end
Chapter 3 Configuring General Router Features
To display the target administration configuration changes you have entered, enter the show configuration command in administration configuration mode or in any submode, as shown in the
following example:
RP/0/0/CPU0:router(admin-config-sdr:test)# show configuration
Building configuration... sdr test location 0/1/* primary ! end
Displaying a Combined Target and Running Configuration
Although the target and running configurations remain separate until the target configuration is committed, you can preview the combined target and running configuration without committing the changes. The combined configuration shows what the new running configuration will look like after the changes from the target configuration are committed. It does not represent the actual running configuration.
You can preview the combined configuration in global configuration and administration configuration modes. You cannot preview the combined configuration in EXEC modes because the target configuration must be committed or abandoned before returning to EXEC or administration EXEC mode.
To display the combined target and running configuration, enter the show configuration merge command in any configuration mode.
3-58
Note The merge option does not appear in command help until the target configuration contains at least one
configuration change.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
The following example shows how to display the active SDR configuration (show running-config), configure an interface, and display the merged configuration:
RP/0/0/CPU0:router# show running-config
Building configuration... !! Last configuration change at 16:52:49 UTC Sun March 10 2004 by cisco ! hostname router shutdown end
RP/0/RP0/CPU0:router# configure RP/0/RP0/CPU0:router(config)# interface POS 0/3/0/3 RP/0/RP0/CPU0:router(config-if)# description faq RP/0/RP0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0
RP/0/RP0/CPU0:router(config)# show configuration merge Building configuration... !! Last configuration change at 16:52:49 UTC Sun March 10 2004 by cisco ! hostname router interface POS0/3/0/3 description faq ipv4 address 10.1.1.1 255.0.0.0 shutdown end
Managing Configuration Sessions
Displaying Configuration Error Messages and Descriptions
Configuration changes are automatically verified during the commit operation, and a message appears if one or more configuration entry fails. To display an error message and description for a failed configuration, enter the show configuration failed command.
Note You can view configuration errors only during the current configuration session. If you exit
configuration mode after the commit operation, the configuration error information is lost.
In the following example, an error is introduced in global configuration mode and the error information appears after the commit operation fails:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# taskgroup alr RP/0/0/CPU0:router(config-tg)# description this is a test of an invalid taskgroup RP/0/0/CPU0:router(config-tg)# commit
% Failed to commit one or more configuration items. Please use 'show configuration failed' to view the errors
RP/0/0/CPU0:router(config-tg)# show configuration failed
!! CONFIGURATION FAILED DUE TO SEMANTIC ERRORS taskgroup alr !!% Usergroup/Taskgroup names cannot be taskid names !
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-59
Chapter 3 Configuring General Router Features
Managing Configuration Sessions
Displaying Configuration Error Messages Without Descriptions
Configuration changes are automatically verified during the commit operation, and a message appears if one or more configuration entry fails. To display only the error message (without a description) for a failed configuration, enter the show configuration failed noerror command, as shown in the following example:
RP/0/0/CPU0:router(config-tg)# show configuration failed noerror
!! CONFIGURATION FAILED DUE TO SEMANTIC ERRORS taskgroup alr !
Note You can view configuration errors only during the current configuration session. If you exit
configuration mode after the commit operation, the configuration error information is lost.
Displaying Configuration Error Messages Produced While Loading a Configuration
To display any syntax errors found in a configuration loaded with the load command, enter the show configuration failed load command.

Saving the Target Configuration to a File

Target configurations can be saved to a separate file without committing them to the running configuration. Target configuration files can then be loaded at a later time and further modified or committed.
To save the configuration changes in the target configuration to a file, enter the save configuration device: command. Replace the device argument with the name of the device on which you want to store the file (for example, disk0). After you enter this command, the router prompts you to enter a filename. If you enter only a filename, the file is stored in the root directory of the device. To store the file in a directory, enter the directory path and filename when prompted. We recommend that you specify the cfg file extension for easy identification. This suffix is not required, but it can help locate target configuration files, for example:
myconfig.cfg
The following example shows a target configuration file saved to the usr/cisco directory of disk0:
RP/0/0/CPU0:router(admin-config)# save configuration disk0:
Mon May 31 21:52:13.237 DST Destination file name (control-c to abort): [/running-config]?/usr/cisco/test.cfg Building configuration. 1 lines built in 1 second [OK]
You can also save a configuration to a file using the show configuration | file filename command:
RP/0/0/CPU0:router(config)#show configuration | file abc.cfg Thu Jul 22 23:03:04.722 DST Building configuration...
3-60
[OK]
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features

Loading the Target Configuration from a File

To populate the target configuration with the contents of a previously saved configuration file, go to global configuration or administration configuration mode and enter the load filename command. Consider the following when entering the filename argument:
Specifies the configuration file to be loaded into the target configuration.
If the full path of the file is not specified, the router attempts to load the file from the root directory
on the device.
The following example shows a target configuration file loaded into the current configuration session. The current configuration session is populated with the contents of the file.
RP/0/0/CPU0:router(config)# load disk0:/usr/cisco/test.cfg
Loading. 77 bytes parsed in 1 sec (76)bytes/sec

Loading an Alternative Configuration at System Startup

Managing Configuration Sessions
When a router is reset or powered on, the last running configuration is loaded and used to operate the router.
You can load an alternative configuration during system boot. For information and instructions on this process, see Cisco IOS XR ROM Monitor Guide for the Cisco XR 12000 Series Router.

Clearing All Changes to a Target Configuration

To clear changes made to the target configuration without terminating the configuration session, enter the clear command in global configuration mode or administration configuration mode. This command deletes any configuration changes that have not been committed.
In the following example, the user configures an interface but does not commit it. After reviewing the changes to the target configuration with the show configuration command, the user decides to remove the changes and start over by entering the clear command:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# interface POS 0/3/0/1 RP/0/0/CPU0:router(config-if)# description this is my interface RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0 RP/0/0/CPU0:router(config-if)# shutdown RP/0/0/CPU0:router(config-if)# exit
RP/0/0/CPU0:router(config)# show configuration
Building configuration... interface POS0/3/0/1 description this is my interface ipv4 address 10.1.1.1 255.0.0.0 shutdown end
OL-24755-01
RP/0/0/CPU0:router(config)# clear RP/0/0/CPU0:router(config)# show configuration Building configuration... end
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-61
Managing Configuration Sessions

Committing Changes to the Running Configuration

The changes in the target configuration do not become part of the running configuration until you enter the commit command. When you commit a target configuration, you can use the commit command to do either of the following:
Merge the target configuration with the running configuration to create a new running configuration.
Replace the running configuration with the target configuration.
Note If you try to end a configuration session without saving your changes to the running configuration with
the commit command, you are prompted to save the changes. For more information, see the “Ending a
Configuration Session” section on page 3-65.
To commit target configuration changes to the running configuration, enter the commit command by itself or with one or more of the options described in Table 3 -5.
Table 3-5 Commit Command Options
Command Description
commit (Default) Merges the target configuration with the running configuration
and commits changes only if all changes in the target configuration pass the semantic verification process. If any semantic errors are found, none of the configuration changes takes effect.
commit best-effort Merges the target configuration with the running configuration and
commits only valid changes (best effort). Some configuration changes might fail due to semantic errors.
commit comment line (Optional) Assigns a comment to a commit.
This text comment appears in the commit entry displayed with the
show configuration commit list [detail] command.
Chapter 3 Configuring General Router Features
3-62
The line argument is the text for the optional comment or label.
The comment option must appear at the end of the command line. If
multiple options are entered, all text after the comment option is treated as a comment.
commit confirmed
seconds
(Optional) Commits the configuration in global configuration mode on a trial basis for a minimum of 30 seconds and a maximum of 300 seconds (5 minutes).
During the trial configuration, enter commit to confirm the
configuration. If you do not enter the commit command, the router reverts to the previous configuration when the trial time period expires.
The confirmed option is not available in administration
configuration mode.
commit label line (Optional) Assigns a meaningful label. This label appears in the output
for the show configuration commit list [detail] command instead of the numeric label.
The line argument is the text for the optional comment or label.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Table 3-5 Commit Command Options (continued)
Command Description
commit force (Optional) Merges the target configuration with the running
commit replace (Optional) Replaces the contents of the running configuration with the
Managing Configuration Sessions
configuration and allows a configuration commit in low-memory conditions.
A low-memory warning occurs when a user attempts to commit a target configuration that exceeds the default capacity of the router.
The recommended resolution to such a warning is to remove configurations using the no commands.
Caution The force option can cause the router to experience severe
problems if low-memory conditions occur. The force option should be used only to remove configurations.
target configuration.
Examples
The following examples illustrate how to commit a configuration:
Committing a Configuration from Global Configuration Mode: Example, page 3-63
Committing a Configuration from Administration Configuration Mode: Example, page 3-63
Committing a Configuration from Global Configuration Mode: Example
In the following example, the default commit command is entered in global configuration mode:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# interface POS 0/0/0/2 RP/0/0/CPU0:router(config-if)# description faq RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0 RP/0/0/CPU0:router(config-if)# commit
RP/0/0/0:Aug 6 09:26:17.781 : %LIBTARCFG-6-COMMIT Configuration committed by user ‘cisco'. Use 'show configuration commit changes 1000000124' to view the changes.
Note The preceding message is stored in the log and appears only if logging is configured to display on screen.
Committing a Configuration from Administration Configuration Mode: Example
In the following example, the commit command is entered with the label and comment keywords in administration configuration mode:
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)# configure RP/0/0/CPU0:router(admin-config)# sdr test RP/0/0/CPU0:router(admin-config-sdr:test)# location 0/1/* primary RP/0/0/CPU0:router(admin-config-sdr:test)# commit label test comment This is a test RP/0/0/CPU0:router(admin-config)# show configuration commit list detail
OL-24755-01
1) CommitId: 2000000018 Label: test
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-63
Managing Configuration Sessions
UserId: user1 Line: vty1 Client: CLI Time: 23:45:40 UTC Tue Mar 07 2006 Comment: This is a test . . .
Note Configuration files are stored on the same flash disk as the boot image. Access these configurations only
through the CLI commands for configuration management, history, and rollback. Direct modification or deletion of these files can result in lost router configurations.

Reloading a Failed Configuration

If the router displays a configuration failure message when you attempt to commit a configuration change, the configuration changes are not lost. While you remain in global configuration mode or administration configuration mode, you can load the configuration changes into the target configuration, correct the errors, and commit the changes.
To load a failed configuration, go to global configuration or administration configuration mode and enter the load configuration failed commit command, as shown in the following example:
RP/0/0/CPU0:router(config)# load configuration failed commit RP/0/0/CPU0:router(config)# show configuration
Chapter 3 Configuring General Router Features
Building configuration... taskgroup alr ! end
In the preceding example, the show configuration command displays the target configuration, which includes the failed configuration.
Note The failed configuration is discarded if you exit global configuration mode or administration
configuration mode without recovering the configuration. After recovery, correct and commit the configuration or save it to a file to avoid losing it.

Exiting a Configuration Submode

When you have finished configuration changes in a configuration submode, such as the interface or SDR configuration submodes, you can return to the previous configuration mode and continue making configuration changes. To exit a configuration submode, enter the exit command, as shown in the following example:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# interface POS 0/3/0/1 RP/0/0/CPU0:router(config-if)# description this is my interface RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0 RP/0/0/CPU0:router(config-if)# exit RP/0/0/CPU0:router(config)#
3-64
Note If you use the exit command to exit global configuration or administration configuration mode, the
router prompts you to save changes, discard changes, or cancel the action, as described in the next section.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features

Returning Directly to Configuration Mode from a Submode

When you have finished configuration changes in a configuration submode, such as the interface or SDR configuration submodes, you can skip all intermediate submodes and return to the top-level configuration mode and continue making configuration changes. To return to configuration mode, enter the root command, as shown in the following example:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# router static RP/0/0/CPU0:router(config-static)# address-family ipv4 unicast RP/0/0/CPU0:router(config-static-afi)# root RP/0/0/CPU0:router(config)#

Ending a Configuration Session

You can use any of the following methods to end a configuration session:
Enter the exit command in global configuration or administration configuration mode
Enter the end command in any configuration mode or submode
Press Ctrl-Z
Managing Configuration Sessions
Note If you enter the exit command in a configuration submode, the command returns you to the parent
configuration level.
If you end a configuration session without committing the configuration changes, the router prompts you to save changes, discard changes, or cancel the action, as shown in the following example:
RP/0/0/CPU0:router(config-if)# end
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
Respond to the prompt by entering one of the following options:
yes—Commit the configuration changes and exit configuration mode
no—Exit configuration mode without committing the configuration changes
cancel—Remain in configuration mode without committing the configuration changes
Note In EXEC mode, the exit command logs the user out of the system.

Aborting a Configuration Session

When you abort a configuration session, any changes are discarded and the configuration session ends. No warning is given before the configuration changes are deleted.
The abort command in global configuration mode, discards configuration changes and returns to EXEC mode. In administration configuration mode, the abort command discards configuration changes and returns to administration EXEC mode. To abort a configuration session, enter the abort command, as shown in the following example:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# hostname host1 RP/0/0/CPU0:router(config)# interface POS 0/2/0/2
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-65

Configuring the SDR Hostname

RP/0/0/CPU0:router(config-if)# description this is my interface RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.0.0.0 RP/0/0/CPU0:router(config-if)# shutdown RP/0/0/CPU0:router(config-if)# abort RP/0/0/CPU0:router#
Configuring the SDR Hostname
The hostname identifies an SDR on the network. Although devices can be uniquely identified by their Layer 2 and Layer 3 addresses (such as an IP address), it is often simpler to remember network devices by an alphanumeric “hostname.” This name is used in the CLI prompt and default configuration filenames and to identify the SDR on the network.
To configure the hostname, enter the hostname command with the SDR name as shown in the following example:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# hostname SDR_SJ RP/0/0/CPU0:router(config)# commit
RP/0/0/CPU0:Apr 7 00:07:33.246 : config[65669]: %LIBTARCFG-6-COMMIT : Configuration committed by user 'user_a'. Use 'show configuration commit changes 1000000067' to view the changes. RP/0/0/CPU0:SDR_SJ(config)#
Chapter 3 Configuring General Router Features
The preceding example sets the SDR name to SDR_SJ.
Note No blanks or spaces are permitted as part of a name. Do not expect case to be preserved. Uppercase and
lowercase characters look the same to many Internet software applications. It may seem appropriate to capitalize a name the same way you might if you were writing, but conventions dictate that computer names appear all lowercase. For more information, see RFC 1178, Choosing a Name for Your Computer.

Configuring the Management Ethernet Interface

The Management Ethernet interface on the RPs is used to connect the router to a network for remote management using a Telnet client, the Simple Network Management Protocol (SNMP), or other management agents. The following sections provide information on the Management Ethernet interface:
Specifying the Management Ethernet Interface Name in CLI Commands, page 3-67
Displaying the Available Management Ethernet Interfaces, page 3-67
Configuring the Management Ethernet Interface, page 3-68
3-66
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features

Displaying the Available Management Ethernet Interfaces

Specifying the Management Ethernet Interface Name in CLI Commands

Before you can configure the Management Ethernet interface, you must know the Management Ethernet interface name, which is defined using the following syntax: typerack/slot/module/port. Table 3 -6 describes the Management Ethernet interface name syntax.
Table 3-6 Management Ethernet Interface Name Syntax Description
Syntax Component Description
type Interface type for a Management Ethernet port is “MgmtEth.”
rack Chassis number of the rack. In a single-shelf system, the rack is always
“0”.
slot Physical slot of the RP or DRP on which the interface is located. For a
Cisco XR 12000 Series Router, the PRPs may be installed in slots 0 through 15, depending on the router model.
module On an RP, the module is “CPU0”. DRPs have two processors, so the
module is either “CPU0” and “CPU1”.
port On Cisco XR 12000 Series Routers, there are three Ethernet ports on
PRP-2 cards. The Ethernet ports are labeled ETH 0, ETH 1, and ETH 2. For the ETH 0 port, specify 0; for the ETH 1 port, specify 1; and for the ETH 2 port, specify 2.
Specify 0 for the MGMT ETH interface on an RP or DRP.
Tabl e 3-7 shows examples of Management Ethernet interface names for a single-shelf system.
Table 3-7 Management Ethernet Interface Names for Single-Shelf Systems
Management Interface Interface Name Example
Cisco XR 12000 Series Router PRP in slot 0, port ETH0
Cisco XR 12000 Series Router PRP in slot 0, port ETH1
Cisco XR 12000 Series Router PRP in slot 1, port ETH0
Cisco XR 12000 Series Router PRP in slot 1, port ETH1
MgmtEth0/0/CPU0/0 router(config)# interface
MgmtEth0/0/CPU0/0
MgmtEth0/0/CPU0/1 router(config)# interface
MgmtEth0/0/CPU0/1
MgmtEth0/1/CPU0/0 router(config)# interface
MgmtEth0/1/CPU0/0
MgmtEth0/1/CPU0/1 router(config)# interface
MgmtEth0/1/CPU0/1
Displaying the Available Management Ethernet Interfaces
To display the router interfaces, enter the show interfaces brief command in EXEC mode:
RP/0/0/CPU0:router# show interfaces brief Mon May 31 22:03:33.039 DST
OL-24755-01
Intf Intf LineP Encap MTU BW
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-67
Displaying the Available Management Ethernet Interfaces
Name State State Type (byte) (Kbps)
-------------------------------------------------------------------------------­ Lo0 up up Loopback 1500 0 Nu0 up up Null 1500 0 ti1019 up up TUNNEL_GRE 1500 100 ti10100 up up TUNNEL_GRE 1500 100 ti10200 up up TUNNEL_GRE 1500 100 tt100 down down TUNNEL 1500 0 tt1060 up up TUNNEL 1500 0 PO0/6/0/0 up up HDLC 4474 155520 PO0/6/0/1 up up HDLC 4474 155520 PO0/6/0/2 admin-down admin-down HDLC 4474 155520 PO0/6/0/3 up up HDLC 4474 155520 Te0/6/1/0 up up ARPA 1514 10000000 PO0/6/4/0 admin-down admin-down HDLC 4474 622080 PO0/6/4/1 admin-down admin-down HDLC 4474 622080 PO0/6/4/2 admin-down admin-down HDLC 4474 622080 PO0/6/4/3 admin-down admin-down HDLC 4474 622080 PO0/6/4/4 up up HDLC 4474 622080 PO0/6/4/5 up up HDLC 4474 622080 PO0/6/4/6 up up HDLC 4474 622080 PO0/6/4/7 admin-down admin-down HDLC 4474 622080 Gi0/6/5/0 admin-down admin-down ARPA 1514 1000000 Gi0/6/5/1 up up ARPA 2014 1000000 Gi0/6/5/2 up up ARPA 2014 1000000 Gi0/6/5/3 admin-down admin-down ARPA 1514 1000000 Gi0/6/5/4 up up ARPA 2014 1000000 Gi0/6/5/5 up up ARPA 2014 1000000 Gi0/6/5/6 up up ARPA 2014 1000000 Gi0/6/5/7 up up ARPA 2014 1000000 Mg0/RP0/CPU0/0 up up ARPA 1514 100000 Mg0/RP1/CPU0/0 up up ARPA 1514 100000
Chapter 3 Configuring General Router Features

Configuring the Management Ethernet Interface

To use the Management Ethernet interface for system management and remote communication, you must configure an IP address and a subnet mask for the interface. To have the interface communicate with devices on other networks (such as remote management stations or TFTP servers), you need to configure a default route for the router.
Tip For information on additional configuration options for the Management Ethernet interface, see
Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco XR 12000 Series Router.
Prerequisites
To configure the Ethernet Management port for network communications, you must enter the interface network addresses and subnet mask. Consult your network administrator or system planner for this information.
SUMMARY STEPS
1. configure
2. interface MgmtEth rack/slot/CPU0/port
3-68
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
3. ipv4 address ipv4-address subnet-mask
4. no shutdown
5. exit
6. router static address-family ipv4 unicast 0.0.0.0/0 default-gateway
7. commit
8. end
9. show interfaces MgmtEthrack/slot/CPU0/port
Displaying the Available Management Ethernet Interfaces
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-69
Displaying the Available Management Ethernet Interfaces
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/0/CPU0:router# configure
Step 2
interface MgmtEthrack/slot/CPU0/port
Example:
RP/0/0/CPU0:router(config)# interface MgmtEth0/RP0/CPU0/0
Step 3
ipv4 address ipv4-address subnet-mask
Example:
RP/0/0/CPU0:router(config-if)# ipv4 address
10.1.1.1 255.0.0.0
Step 4
no shutdown
Chapter 3 Configuring General Router Features
Enters global configuration mode.
Enters interface configuration mode and specifies the Management Ethernet interface of the primary RP.
The syntax is
interface typerack/slot/module/port:
Tabl e 3-6 describes the command parameters.
Assigns an IP address and subnet mask to the interface.
Places the interface in an “up” state.
Step 5
Step 6
Step 7
Example:
RP/0/0/CPU0:router(config-if)# no shutdown
exit
router static address-family ipv4 unicast
0.0.0.0/0 default-gateway
Example:
RP/0/0/CPU0:router (config)# router static address-family ipv4 unicast 0.0.0.0/0 12.25.0.1
commit
Example:
RP/0/0/CPU0:(config)# commit
Exits the Management Ethernet interface configuration mode.
Configures a default route to use for communications with devices on other networks.
Replace default-gateway with the IP address of the
local gateway that can be used to reach other networks.
This default route applies to all interfaces. You might
need to configure additional static routes to support your network. For more information on configuring static routes, see Cisco IOS XR Routing
Configuration Guide for the Cisco XR 12000 Series Router.
Commits the target configuration to the running configuration.
3-70
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
Command or Action Purpose
Step 8
end
Example:
RP/0/0/CPU0:router(config)# end
Step 9
show interfaces MgmtEthrack/slot/CPU0/port
Example:
RP/0/0/CPU0:router# show interfaces MgmtEth0/RP0/CPU0/0
Displaying the Available Management Ethernet Interfaces
Saves configuration changes.
When you issue the end command, the system
prompts you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
Entering no exits the configuration session and
returns the router to EXEC mode without committing the configuration changes.
Entering cancel leaves the router in the current
configuration session without exiting or committing the configuration changes.
Displays interface details to verify the settings.
Examples
The following example shows how the Management Ethernet interface on the RP in slot RP1 is configured with an IP address.
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# interface MgmtEth0/0/CPU0/0 RP/0/0/CPU0:router(config-if)# ipv4 address 10.1.1.1 255.255.255.0 RP/0/0/CPU0:router(config-if)# no shutdown RP/0/0/CPU0:router(config-if)# commit RP/0/0/CPU0:router(config-if)# end RP/0/0/CPU0:router# RP/0/0/CPU0:router# show interfaces MgmtEth 0/0/CPU0/0
MgmtEth0/0/CPU0/0 is up, line protocol is up Interface state transitions: 1 Hardware is Management Ethernet, address is 0011.93ef.e8e6 (bia 0011.93ef.e8e6) Description: Connected to Lab LAN Internet address is 172.29.52.70/24 MTU 1514 bytes, BW 100000 Kbit reliability 255/255, txload 0/255, rxload 0/255 Encapsulation ARPA, Half-duplex, 100Mb/s, 1000BASE-T, link type is autonegotiation output flow control is off, input flow control is off loopback not set, ARP type ARPA, ARP timeout 04:00:00 Last input 00:00:00, output 00:00:00 Last clearing of "show interface" counters never 5 minute input rate 0 bits/sec, 0 packets/sec 5 minute output rate 0 bits/sec, 0 packets/sec 31371 packets input, 1922996 bytes, 153 total input drops 0 drops for unrecognized upper-level protocol Received 19457 broadcast packets, 0 multicast packets 12 runts, 0 giants, 0 throttles, 0 parity 61 input errors, 27 CRC, 12 frame, 0 overrun, 0 ignored, 0 abort 12869 packets output, 878236 bytes, 0 total output drops
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-71

Manually Setting the Router Clock

Output 5 broadcast packets, 0 multicast packets 0 output errors, 0 underruns, 0 applique, 0 resets 0 output buffer failures, 0 output buffers swapped out 1 carrier transitions
Related Documents
Related Topic Document Title
Additional information about configuring management interfaces
Advanced Configuration and Modification of the Management Ethernet Interface on Cisco IOS XR Software module of Cisco IOS XR Interface and Hardware Component Configuration Guide for the Cisco XR 12000 Series Router
Manually Setting the Router Clock
Generally, if the system is synchronized by a valid outside timing mechanism, such as a Network Time Protocol (NTP) or VINES clock source, you do not need to set the software clock. Use the clock set command for initial configuration or if a network time source is not available.
The clock timezone command should be entered before the clock is set because it defines the difference between the system time and Coordinated Universal Time (UTC). When you set the time, you set the system time, and the router uses the clock timezone command setting to translate that time to UTC. The system internally keeps time in UTC. When you enter the show clock command, the router displays the system time.
To manually set the router clock, follow these steps:
Chapter 3 Configuring General Router Features
SUMMARY STEPS
1. configure
2. clock timezone zone hours-offset
3. commit
4. end
5. clock set hh:mm:ss dd mm yyyy
6. clock update-calendar
7. show clock
3-72
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 3 Configuring General Router Features
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/0/CPU0:router# configure
Step 2
clock timezone zone hours-offset
Example:
RP/0/0/CPU0:router(config)# clock timezone pst
-8
Step 3
commit
Manually Setting the Router Clock
Enters global configuration mode.
Sets the time zone for the router clock.
clock timezone command should be entered before
the clock is set because it defines the difference between the system time and UTC.
Note The system time is the time that appears when you
enter the show clock command.
zone—Name of the time zone to be displayed when
standard time is in effect.
hours-offset—Difference in hours from UTC.
Commits the target configuration to the running configuration.
Example:
RP/0/0/CPU0:router(config-if)# commit
Step 4
end
Example:
RP/0/0/CPU0:router(config-if)# end
Step 5
clock set hh:mm:ss dd mm yyyy
Example:
RP/0/0/CPU0:router# clock set 14:12:00 10 dec 2008
Step 6
clock update-calendar
Example:
RP/0/0/CPU0:router# clock update-calendar
Step 7
show clock
Example:
RP/0/0/CPU0:router# show clock
Examples
Ends the configuration session and returns to EXEC mode.
Sets the system software clock.
Updates the hardware clock (calendar clock) with the new clock settings.
It is battery operated and runs continuously, even if the
router is powered off or rebooted.
Displays the clock setting.
Use this command to verify the settings.
OL-24755-01
The following example shows how the manual system clock is configured:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# clock timezone pst -8 RP/0/0/CPU0:router(config)# commit RP/0/0/CPU0:router(config)# end
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
3-73
Chapter 3 Configuring General Router Features

Where to Go Next

RP/0/0/CPU0:router# clock set 14:12:00 10 dec 2008 14:12:00.090 PST Wed Dec 02 2008 RP/0/0/CPU0:router# clock update-calendar RP/0/0/CPU0:router# show clock 14:12:00.090 PST Wed Dec 02 2008
Related Documents
Related Topic Document Title
Descriptions of the clock commands Clock Commands on Cisco IOS XR Software module of Cisco IOS XR
System Management Command Reference for the Cisco XR 12000 Series Router
Commands used to configure NTP NTP Commands on Cisco IOS XR Software module of Cisco IOS XR
System Management Command Reference for the Cisco XR 12000 Series Router
Configuration of NTP Implementing NTP on Cisco IOS XR Software module of Cisco IOS XR
System Management Configuration Guide for the Cisco XR 12000 Series Router
Where to Go Next
When you have completed the configuration procedures in this chapter, consider the following resources for additional configuration documentation:
For information on configuring additional general router features, see Configuring Additional
Router Features
For information on using the Cisco IOS XR software more efficiently, see CLI Tips, Techniques,
and Shortcuts
For information on configuring interfaces, see the hardware documents listed in the “Related
Documents” section on page x.
3-74
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01

Contents

CHAPTER
4

Configuring Additional Router Features

This chapter contains instructions and information for entering basic configurations using the command-line interface (CLI).
Configuring the Domain Name and Domain Name Server, page 4-75
Configuring Telnet, HTTP, and XML Host Services, page 4-77
Managing Configuration History and Rollback, page 4-81
Configuring Logging and Logging Correlation, page 4-86
Creating and Modifying User Accounts and User Groups, page 4-90

Configuring the Domain Name and Domain Name Server

Configure a domain name and Domain Name Server (DNS) for your router to contact other devices on your network efficiently. Use the following guidelines:
To define a default domain name that the Cisco IOS XR software uses to complete unqualified
hostnames (names without a dotted-decimal domain name), use the domain-name command in global configuration mode.
To specify the address of one or more name servers to use for name and address resolution, use the
domain name-server command in global configuration mode. If no name server address is specified, the default name server is 255.255.255.255 so the DNS lookup can be broadcast to the local network segment. If a DNS server is in the local network, it replies. If not, there might be a server that knows how to forward the DNS request to the correct DNS server.
Use the show hosts command in EXEC mode to display the default domain name, the style of name
lookup service, a list of name server hosts, and the cached list of hostnames and addresses.
To configure the DNS and DNS server, follow these steps:
SUMMARY STEPS
1. configure
2. domain name domain-name-of-organization
3. domain name-server ipv4-address
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-75
Configuring the Domain Name and Domain Name Server
4. end or commit
5. show hosts
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/0/CPU0:router# configure
Step 2
domain name domain-name-of-organization
Example:
RP/0/0/CPU0:router(config)# domain name cisco.com
Step 3
domain name-server ipv4-address
Example:
RP/0/0/CPU0:router(config)# domain name-server
192.168.1.111
Step 4
end
or
commit
Example:
RP/0/0/CPU0:router(config)# end or
RP/0/0/CPU0:router(config)# commit
Chapter 4 Configuring Additional Router Features
Enters global configuration mode.
Defines a default domain name used to complete unqualified hostnames.
Specifies the address of a name server to use for name and address resolution (hosts that supply name information).
Note You can enter up to six addresses, but only one for
each command.
Saves configuration changes.
When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode.
Step 5
4-76
show hosts
Example:
RP/0/0/CPU0:router(config)# show hosts
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes.
Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
Use the commit command to save the configuration
changes to the running configuration file and remain within the configuration session.
Displays all configured name servers.
OL-24755-01
Chapter 4 Configuring Additional Router Features
Examples
The following example shows how the domain name and DNS are configured:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# domain name cisco.com RP/0/0/CPU0:router(config)# domain name-server 10.1.1.1 RP/0/0/CPU0:router(config)# commit RP/0/0/CPU0:router(config)# end RP/0/0/CPU0:router# show hosts
Default domain is cisco.com Name/address lookup uses domain service Name servers: 10.1.1.1
Related Documents
Related Topic Document Title
Complete descriptions of the domain services commands
Implementing Host Services and Applications on Cisco IOS XR Software module in Cisco IOS XR IP Addresses and Services Configuration Guide for the Cisco XR 12000 Series Router

Configuring Telnet, HTTP, and XML Host Services

Configuring Telnet, HTTP, and XML Host Services
For security reasons, some host services are disabled by default. You can enable Host services, such as Telnet, XML, and HTTP by using the commands described in this section. Host services provide the following features:
Enabling the Telnet server allows users to log in to the router using IPv4 or IPv6 Telnet clients.
Enabling the XML agent enables XML Common Object Request Broker Architecture (CORBA)
agent services so that you can manage and configure the router using an XML interface.

Prerequisites

Ensure the following prerequisites are met before configuring Telnet, HTTP, and XML host services:
For the XML and HTTP host services, the Manageability package must be installed and activated
on the router.
To enable the Secure Socket Layer (SSL) of the HTTP and XML services, the security package must
be installed and activated on the router.
See Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router for information on installing and activating packages.
Note This process enables the Telnet, HTTP, and XML host services on the Management Ethernet interfaces.
For more information on how to enable these services on other inband interfaces, see Implementing Management Plane Protection in Cisco IOS XR Software module in Cisco IOS XR System Security Configuration Guide for the Cisco XR 12000 Series Router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-77
Configuring Telnet, HTTP, and XML Host Services
SUMMARY STEPS
1. configure
2. interface MgmtEth interface-path-id
ipv4 address ipv4-address subnetmask
3. ipv4 virtual address ipv4-address subnetmask
4. end or commit
5. exit
6. configure
7. telnet {ipv4 | ipv6} server max-servers limit
8. http server
9. xml agent
10. end or commit
DETAILED STEPS
Chapter 4 Configuring Additional Router Features
Step 1
Step 2
Step 3
Command or Action Purpose
configure
Enters global configuration mode.
Example:
RP/0/0/CPU0:router# configure
interface MgmtEth interface-path-id ipv4 address ipv4-address subnetmask
Configures the Management Ethernet ports on the active and standby RPs.
Example:
Active RP
RP/0/0/CPU0:router(config)# interface MgmtEth0/RP0/CPU0/0 RP/0/0/CPU0:router(config-if)# ipv4 address
172.29.52.75 255.255.255.0 RP/0/RP0/CPU0:router(config-if)# no shut RP/0/RP0/CPU0:router(config-if)# exit
Standby RP
RP/0/0/CPU0:router(config)# interface MgmtEth0/RP1/CPU0/0 RP/0/0/CPU0:router(config-if)# ipv4 address
172.29.52.76 255.255.255.0 RP/0/0/CPU0:router(config-if)# no shut RP/0/0/CPU0:router(config-if)# exit
ipv4 virtual address ipv4-address subnetmask
RP/0/0/CPU0:router(config)# ipv4 virtual address 172.29.52.77 255.255.255.0
Defines an IPv4 virtual address for the Management Ethernet interface.
4-78
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features
Command or Action Purpose
Step 4
end
or
commit
Example:
RP/0/0/CPU0:router(config)# end or RP/0/0/CPU0:router(config)# commit
Step 5
exit
Configuring Telnet, HTTP, and XML Host Services
Saves configuration changes.
When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode.
Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes.
Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
Use the commit command to save the configuration
changes to the running configuration file and remain within the configuration session.
Exits global configuration mode.
Step 6
Step 7
Step 8
Example:
RP/0/0/CPU0:router(config)# exit
configure
Example:
RP/0/0/CPU0:router# configure
telnet ipv4 server max-servers limit
or
telnet ipv6 server max-servers limit
Example:
RP/0/0/CPU0:router(config)# telnet ipv4 server max-servers 5
http server
Example:
RP/0/0/CPU0:router(config)# http server
Enters global configuration mode.
Enables Telnet services on the router and specifies the maximum number of allowable Telnet servers.
Enables HTTP server on the router.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-79
Configuring Telnet, HTTP, and XML Host Services
Command or Action Purpose
Step 9
xml agent
Example:
RP/0/0/CPU0:router(config)# xml agent RP/0/0/CPU0:router(config)# xml agent tty
Step 10
end
or
commit
Example:
RP/0/0/CPU0:router(config)# end or RP/0/0/CPU0:router(config)# commit
Chapter 4 Configuring Additional Router Features
Enables XML requests on the router.
Saves configuration changes.
When you issue the end command, the system prompts
you to commit changes:
Uncommitted changes found, commit them before exiting(yes/no/cancel)? [cancel]:
Entering yes saves configuration changes to the running configuration file, exits the configuration session, and returns the router to EXEC mode.
Entering no exits the configuration session and returns the router to EXEC mode without committing the configuration changes.
Examples
Entering cancel leaves the router in the current configuration session without exiting or committing the configuration changes.
Use the commit command to save the configuration
changes to the running configuration file and remain within the configuration session.
The following example shows how the host services are enabled:
RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# interface MgmtEth0/RP0/CPU0/0 RP/0/0/CPU0:router(config)# ipv4 address 172.29.52.75 255.255.255.0 RP/0/0/CPU0:router(config)# ipv4 virtual address 172.29.52.77 255.255.255.0 RP/0/0/CPU0:router(config)# commit RP/0/0/CPU0:router(config)# exit RP/0/0/CPU0:router# configure RP/0/0/CPU0:router(config)# telnet ipv4 server max-servers 5 RP/0/0/CPU0:router(config)# http server RP/0/0/CPU0:router(config)# xml agent RP/0/0/CPU0:router(config)# commit
4-80
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features

Managing Configuration History and Rollback

Related Documents
Related Topic Document Title
Installation and activation of the Manageability and Security Packages
Upgrading and Managing Cisco IOS XR Software module of Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router
Descriptions of the HTTP and XML server commands Manageability Commands on Cisco IOS XR Software module
of Cisco IOS XR System Management Command Reference
for the Cisco XR 12000 Series Router
Descriptions of the Telnet commands Host Services and Applications Commands on Cisco IOS XR
Software module of Cisco IOS XR IP Addresses and Services Command Reference for the Cisco XR 12000 Series Router
Managing Configuration History and Rollback
After each commit operation, the system saves a record of the committed configuration changes. This record contains only the changes made during the configuration session; it does not contain the complete configuration. Each record is assigned a unique ID, known as a commit ID.
When multiple commit IDs are present, you can use a commit ID to identify a previous configuration to which to return, or you can use the commit ID to load the configuration changes made during that configuration session. You can also load configuration changes from multiple commit IDs, and you can clear commit IDs. If you are thinking about rolling back the configuration to a specific commit ID, consider the following guidelines:
You cannot roll back to a configuration that was removed because of package incompatibility.
Configuration rollbacks can succeed only when the configuration passes all compatibility checks with the currently active Cisco IOS XR Software release.
If the system finds an incompatible configuration during rollback, the operation fails and an error
appears.
The Cisco IOS XR software automatically saves up to 100 of the most recent commit IDs. The following sections describe how to manage configuration changes and roll back to a previously committed configuration:
Displaying the Commit IDs, page 4-82
Displaying the Configuration Changes Recorded in a Commit ID, page 4-82
Previewing Rollback Configuration Changes, page 4-83
Rolling Back the Configuration to a Specific Rollback Point, page 4-83
Rolling Back the Configuration over a Specified Number of Commits, page 4-84
Loading Commit ID Configuration Changes to the Target Configuration, page 4-84
Loading Rollback Configuration Changes to the Target Configuration, page 4-85
OL-24755-01
Deleting Commit IDs, page 4-86
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-81
Managing Configuration History and Rollback

Displaying the Commit IDs

To display a history of up to 100 of the most recent commit IDs, enter the show configuration commit list command in EXEC or administration EXEC mode. Up to 100 of the most recent commit IDs are
saved by the system. Each commit ID entry shows the user who committed configuration changes, the connection used to execute the commit, and commit ID time stamp.
The commit IDs are shown in the “Label/ID” column. The following example shows the show configuration commit list command display in EXEC and administration EXEC modes:
RP/0/0/CPU0:router# show configuration commit list
SNo. Label/ID User Line Client Time Stamp ~~~~ ~~~~~~~~ ~~~~ ~~~~ ~~~~~~ ~~~~~~~~~~ 1 1000000219 cisco vty0 CLI 12:27:50 UTC Wed Mar 22 2006 2 1000000218 cisco vty1 CLI 11:43:31 UTC Mon Mar 20 2006 3 1000000217 cisco con0_RP0_C CLI 17:44:29 UTC Wed Mar 15 2006
RP/0/0/CPU0:router# admin RP/0/0/CPU0:router(admin)# show configuration commit list
SNo. Label/ID User Line Client Time Stamp ~~~~ ~~~~~~~~ ~~~~ ~~~~ ~~~~~~ ~~~~~~~~~~ 1 2000000022 cisco vty1 CLI 15:03:59 UTC Fri Mar 17 2006 2 2000000021 cisco con0_RP0_C CLI 17:42:55 UTC Wed Mar 15 2006 3 2000000020 SYSTEM con0_RP0_C Setup Dial 17:07:39 UTC Wed Mar 15 2006
Chapter 4 Configuring Additional Router Features

Displaying the Configuration Changes Recorded in a Commit ID

To display the configuration changes made during a specific commit session (commit ID), go to EXEC or administration EXEC mode and enter the show configuration commit changes command followed by a commit ID number. The easiest way to determine the commit ID is to enter the show configuration commit changes ? command first. In the following example, the command help is used to display the available commit IDs, and then the changes for a specific commit ID are displayed:
RP/0/0/CPU0:router(admin)# show configuration commit changes ?
last Changes made in the most recent <n> commits since Changes made since (and including) a specific commit 2000000020 Commit ID 2000000021 Commit ID 2000000022 Commit ID
RP/0/0/CPU0:router(admin)# show configuration commit changes 2000000020
Building configuration... username cisco secret 5 $1$MgUH$xzUEW6jLfyAYLKJE.3p440 group root-system ! end
4-82
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features

Previewing Rollback Configuration Changes

The show configuration rollback changes command allows you to preview the configuration changes that take place if you roll back the configuration to a specific commit ID. For example, if you want to roll back the configuration to a specific point, all configuration changes made after that point must be undone. This rollback process is often accomplished by executing the no version of commands that must be undone.
To display the prospective rollback configuration changes from the current configuration to a specific commit ID, go to EXEC or administration EXEC mode and enter the show configuration rollback changes to commit ID command. In the following example, the command help displays the available commit IDs, and then the rollback changes are displayed:
RP/0/0/CPU0:router# show configuration rollback changes to ?
1000000217 Commit ID 1000000218 Commit ID 1000000219 Commit ID
RP/0/0/CPU0:router# show configuration rollback changes to 1000000218
Building configuration... no interface Loopback100 interface POS0/1/0/0 no ipv6 nd dad attempts ! ! no route-policy xx end
Managing Configuration History and Rollback
To display the prospective rollback configuration changes from the current configuration to a specified number of previous sessions, go to EXEC or administration EXEC mode and enter the show configuration rollback changes last commit-range command:
RP/0/0/CPU0:router# show configuration rollback changes last 2
Building configuration... interface Loopback3 no description no ipv4 address 10.0.1.1 255.0.0.0 exit interface Loopback4 no description no ipv4 address 10.0.0.1 255.0.0.0 end
In the preceding example, the command display shows the proposed rollback configuration changes for the last two commit IDs.

Rolling Back the Configuration to a Specific Rollback Point

When you roll back the configuration to a specific rollback point, you undo all configuration changes made during the session identified by the commit ID for that rollback point, and you undo all configuration changes made after that point. The rollback process rolls back the configuration and commits the rolled-back configuration. The rollback process also creates a new rollback point so that you can roll back the configuration to the previous configuration.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-83
Chapter 4 Configuring Additional Router Features
Managing Configuration History and Rollback
Tip To preview the commands that undo the configuration during a rollback, use the show configuration
rollback changes command.
To roll back the router configuration to a previously committed configuration, go to EXEC or administration EXEC mode and enter the rollback configuration to commit ID command:
RP/0/0/CPU0:router# rollback configuration to 1000000220 Loading Rollback Changes. Loaded Rollback Changes in 1 sec Committing. 2 items committed in 1 sec (1)items/sec Updating. Updated Commit database in 1 sec Configuration successfully rolled back to '1000000220'.

Rolling Back the Configuration over a Specified Number of Commits

When you roll back the configuration over a specific number of commits, you do not have to enter a specific commit ID. Instead, you specify a number x, and the software undoes all configuration changes made in the last x committed configuration sessions. The rollback process rolls back the configuration, commits the rolled-back configuration, and creates a new commit ID for the previous configuration.
Tip To preview the commands that undo the configuration during a rollback, use the show configuration
rollback changes command.
To roll back to the last x commits made, go to EXEC or administration EXEC mode and enter the rollback configuration last x command; x is a number ranging from 1 to the number of saved commits in the commit database.
In the following example, a request is made to roll back the configuration changes made during the previous two commits:
RP/0/0/CPU0:router# rollback configuration last 2
Loading Rollback Changes. Loaded Rollback Changes in 1 sec Committing. 1 items committed in 1 sec (0)items/sec Updating. Updated Commit database in 1 sec Configuration successfully rolled back 2 commits.

Loading Commit ID Configuration Changes to the Target Configuration

If the changes saved for a specific commit ID are close to what you want, but a rollback is not appropriate, you can load the configuration changes for a commit ID into the target configuration, modify the target configuration, and then commit the new configuration. Unlike the rollback process, the loaded changes are not applied until you commit them.
4-84
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Chapter 4 Configuring Additional Router Features
Note Unlike the rollback process, loading the commit ID configuration changes loads only the changes made
during that commit operation. The load process does not load all changes made between the commit ID and the current committed configuration.
To load commit ID changes in the target configuration, go to global configuration or administration configuration mode and enter the load commit changes command with the commit ID number. In the following example, show commands are used to display the changes for a commit ID, the commit ID configuration is loaded into the target configuration, and the target configuration is displayed:
RP/0/0/CPU0:router# show configuration commit changes ?
last Changes made in the most recent <n> commits since Changes made since (and including) a specific commit 1000000217 Commit ID 1000000218 Commit ID 1000000219 Commit ID 1000000220 Commit ID 1000000221 Commit ID
RP/0/0/CPU0:router# show configuration commit changes 1000000219 Building configuration... interface Loopback100 ! interface POS0/1/0/0 ipv6 nd dad attempts 50 ! end
Managing Configuration History and Rollback
RP/0/0/CPU0:router# config
RP/0/0/CPU0:router(config)# load commit changes 1000000219 Building configuration... Loading. 77 bytes parsed in 1 sec (76)bytes/sec
RP/0/0/CPU0:router(config)# show configuration
Building configuration... interface Loopback100 ! interface POS0/1/0/0 ipv6 nd dad attempts 50 ! end

Loading Rollback Configuration Changes to the Target Configuration

If the changes for a specific rollback point are close to what you want, but a rollback is not appropriate, you can load the rollback configuration changes into the target configuration, modify the target configuration, and then commit the new configuration. Unlike the rollback process, the loaded changes are not applied until you commit them.
Tip To display the rollback changes, enter the show configuration rollback changes command.
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-85

Configuring Logging and Logging Correlation

To load rollback configuration changes from the current configuration to a specific session, go to global configuration or administration configuration mode and enter the load rollback changes to commit ID command:
RP/0/0/CPU0:router(config)# load rollback changes to 1000000068
Building configuration... Loading. 233 bytes parsed in 1 sec (231)bytes/sec
To load rollback configuration changes from the current configuration to a specified number of previous sessions, go to global configuration or administration configuration mode and enter the load rollback changes last commit-range command:
RP/0/0/CPU0:router(config)# load rollback changes last 6
Building configuration... Loading. 221 bytes parsed in 1 sec (220)bytes/sec
In the preceding example, the command loads the rollback configuration changes for the last six commit IDs.
To load the rollback configuration for a specific commit ID, go to global configuration or administration configuration mode and enter the load rollback changes commit ID command:
RP/0/0/CPU0:router(config)# load rollback changes 1000000060
Chapter 4 Configuring Additional Router Features
Building configuration... Loading. 199 bytes parsed in 1 sec (198)bytes/sec

Deleting Commit IDs

You can delete the oldest configuration commit IDs by entering the clear configuration commits command in EXEC or administration EXEC mode. The clear configuration commits command must be followed by either the amount of disk space to reclaim or number of commit IDs to delete. To reclaim disk space from the oldest commit IDs, enter the clear configuration commits command followed by the diskspace keyword and number of kilobytes to reclaim:
RP/0/0/CPU0:router# clear configuration commits diskspace 50
Deleting 4 rollback points '1000000001' to '1000000004' 64 KB of disk space will be freed. Continue with deletion?[confirm]
To delete a specific number of the oldest commit IDs, enter the clear configuration commits command followed by the oldest keyword and number of commit IDs to delete:
RP/0/0/CPU0:router# clear configuration commits oldest 5
Deleting 5 rollback points '1000000005' to '1000000009' 80 KB of disk space will be freed. Continue with deletion?[confirm]
Configuring Logging and Logging Correlation
System messages generated by the Cisco IOS XR software can be logged to a variety of locations based on the severity level of the messages. For example, you could direct information messages to the system console and also log debugging messages to a network server.
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-86
OL-24755-01
Chapter 4 Configuring Additional Router Features
In addition, you can define correlation rules that group and summarize related events, generate complex queries for the list of logged events, and retrieve logging events through an XML interface.
The following sections describe logging and the basic commands used to log messages in Cisco IOS XR software:
Logging Locations and Severity Levels, page 4-87
Alarm Logging Correlation, page 4-87
Configuring Basic Message Logging, page 4-88
Disabling Console Logging, page 4-90

Logging Locations and Severity Levels

Tabl e 4-1 shows error messages that can be logged to a variety of locations.
Table 4-1 Logging Locations for System Error Messages
Logging Destination Command (Global Configuration Mode)
console logging console
vty terminal logging monitor
external syslog server logging trap
internal buffer logging buffered
Configuring Logging and Logging Correlation
Tabl e 4-2 shows how you can log messages based on the severity level of the messages.
Table 4-2 Logging Severity Levels for System Error Messages
Level Description
Level 0—Emergencies System has become unusable.
Level 1—Alerts Immediate action needed to restore system stability.
Level 2—Critical Critical conditions that may require attention.
Level 3—Errors Error conditions that may help track problems.
Level 4—Warnings Warning conditions that are not severe.
Level 5—Notifications Normal but significant conditions that bear notification.
Level 6—Informational Informational messages that do not require action.
Level 7—Debugging Debugging messages are for system troubleshooting only.

Alarm Logging Correlation

Alarm logging correlation is used to group and filter similar messages to reduce the amount of redundant logs and isolate the root causes of the messages.
For example, the original message describing the online insertion and removal (OIR) and system state being up or down can be reported, and all subsequent messages reiterating the same event can be correlated. When you create correlation rules, a common root event that is generating larger volumes of
OL-24755-01
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
4-87
Configuring Logging and Logging Correlation
follow-on error messages can be isolated and sent to the correlation buffer. An operator can extract all correlated messages for display later, should the need arise. For more information, see Cisco IOS XR System Management Configuration Guide for the Cisco XR 12000 Series Router.

Configuring Basic Message Logging

Numerous options for logging system messages in Cisco IOS XR software are available. This section provides a basic example.
To configure basic message logging, follow these steps:
SUMMARY STEPS
1. configure
2. logging {ip-address | hostname}
3. logging trap severity
4. logging console [severity]
5. logging buffered [severity | buffer-size]
Chapter 4 Configuring Additional Router Features
DETAILED STEPS
Command or Action Purpose
Step 1
configure
Example:
RP/0/0/CPU0:router# configure
Step 2
logging {ip-address | hostname}
Example:
RP/0/0/CPU0:router(config)# logging 10.1.1.1
Step 3
logging trap severity
Example:
RP/0/0/CPU0:router(config)# logging trap debugging
Step 4
logging console [severity]
Example:
RP/0/0/CPU0:router(config)# logging console emergencies
6. commit
7. end
8. show logging
Enters global configuration mode.
Specifies a syslog server host to use for system logging.
Limits the logging of messages sent to syslog servers to only those messages at the specified level.
Tabl e 4-2 shows a summary of the logging severity
levels.
Logs messages on the console.
When a severity level is specified, only messages at
that severity level are logged on the console.
Tabl e 4-2 shows a summary of the logging severity
levels.
4-88
Cisco IOS XR Getting Started Guide for the Cisco XR 12000 Series Router
OL-24755-01
Loading...